* [OE-core][kirkstone 00/16] Patch review
@ 2022-09-13 14:17 Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2022-09-13 14:17 UTC (permalink / raw)
To: openembedded-core
Please review this set of patches for kirkstone and have comments back by
end of day Thursday.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/4220
The following changes since commit bfce90b1260d07f01a8dc2998c9e63ca36d4ebbe:
npm: use npm_registry to cache package (2022-09-06 07:10:59 -1000)
are available in the Git repository at:
git://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Alejandro Hernandez Samaniego (1):
rootfs.py: dont try to list installed packages for baremetal images
Alexandre Belloni (2):
ruby: drop capstone support
runqemu: display host uptime when starting
Joshua Watt (1):
oeqa: qemurunner: Report UNIX Epoch timestamp on login
Khem Raj (2):
autoconf: Fix strict prototype errors in generated tests
autoconf: Update K & R stype functions
Kristian Amlie (1):
externalsrc: Don't wipe out src dir when EXPORT_FUNCTIONS is used.
Martin Jansa (1):
libxml2: Port gentest.py to Python-3
Pavel Zhukov (1):
core-image.bbclass: Exclude openssh complementary packages
Peter Bergin (1):
rootfs-postcommands.bbclass: avoid moving ssh host keys if etc is
writable
Peter Kjellerstedt (1):
cairo: Adapt the license information based on what is being built
Richard Purdie (3):
gcc-multilib-config: Fix i686 toolchain relocation issues
kernel: Always set CC and LD for the kernel build
kernel: Use consistent make flags for menuconfig
wangmy (2):
cracklib: upgrade 2.9.7 -> 2.9.8
vala: upgrade 0.56.2 -> 0.56.3
meta/classes/core-image.bbclass | 4 +
meta/classes/externalsrc.bbclass | 8 +-
meta/classes/kernel.bbclass | 16 +-
meta/classes/rootfs-postcommands.bbclass | 30 +-
meta/lib/oe/rootfs.py | 4 +
meta/lib/oeqa/utils/qemurunner.py | 4 +-
.../0001-Port-gentest.py-to-Python-3.patch | 814 ++++++++++++++++++
meta/recipes-core/libxml/libxml2_2.9.14.bb | 11 +
...ilers-that-moan-about-K-R-func-decls.patch | 138 +++
.../autoconf/autoconf_2.71.bb | 1 +
.../gcc/gcc-multilib-config.inc | 2 +-
...001-Remove-dependency-on-libcapstone.patch | 36 +
meta/recipes-devtools/ruby/ruby_3.1.2.bb | 2 +-
meta/recipes-devtools/vala/vala_0.56.2.bb | 3 -
meta/recipes-devtools/vala/vala_0.56.3.bb | 3 +
...01-rules-Drop-using-register-keyword.patch | 278 ------
...rrect-parameter-types-to-Debug-calls.patch | 40 -
.../{cracklib_2.9.7.bb => cracklib_2.9.8.bb} | 4 +-
meta/recipes-graphics/cairo/cairo_1.16.0.bb | 6 +-
scripts/runqemu | 6 +
20 files changed, 1058 insertions(+), 352 deletions(-)
create mode 100644 meta/recipes-core/libxml/libxml2/0001-Port-gentest.py-to-Python-3.patch
create mode 100644 meta/recipes-devtools/autoconf/autoconf/0001-Port-to-compilers-that-moan-about-K-R-func-decls.patch
create mode 100644 meta/recipes-devtools/ruby/ruby/0001-Remove-dependency-on-libcapstone.patch
delete mode 100644 meta/recipes-devtools/vala/vala_0.56.2.bb
create mode 100644 meta/recipes-devtools/vala/vala_0.56.3.bb
delete mode 100644 meta/recipes-extended/cracklib/cracklib/0001-rules-Drop-using-register-keyword.patch
delete mode 100644 meta/recipes-extended/cracklib/cracklib/0002-rules-Correct-parameter-types-to-Debug-calls.patch
rename meta/recipes-extended/cracklib/{cracklib_2.9.7.bb => cracklib_2.9.8.bb} (83%)
--
2.25.1
^ permalink raw reply [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 00/16] Patch review
@ 2023-08-17 2:49 Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-08-17 2:49 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Friday, August 18.
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/5748
The following changes since commit e1a604db8d2cf8782038b4016cc2e2052467333b:
build-appliance-image: Update to kirkstone head revision (2023-08-07 04:41:22 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Adrian Freihofer (1):
dmidecode: fixup for CVE-2023-30630
Alberto Planas (1):
rpm2cpio.sh: update to the last 4.x version
Alexander Kanavin (1):
libxcrypt: update PV to match SRCREV
Archana Polampalli (2):
ghostscript: fix CVE-2023-38559
qemu: fix CVE-2023-3180
Ashish Sharma (1):
curl: Backport fix CVE-2023-32001
Bruce Ashfield (3):
linux-yocto/5.10: update to v5.10.186
linux-yocto/5.10: update to v5.10.187
linux-yocto/5.10: update to v5.10.188
Marek Vasut (1):
linux-firmware: Fix mediatek mt7601u firmware path
Martin Jansa (1):
npm.bbclass: avoid DeprecationWarning with new python
Narpat Mali (1):
python3-certifi: fix CVE-2023-37920
Pavel Zhukov (1):
scripts/rpm2cpio.sh: Use bzip2 instead of bunzip2
Peter Marko (1):
procps: patch CVE-2023-4016
Vivek Kumbhar (1):
qemu: fix CVE-2023-3354 VNC: improper I/O watch removal in TLS
handshake can lead to remote unauthenticated denial of service
Yogita Urade (1):
qemu: fix CVE-2020-14394
meta/classes/npm.bbclass | 2 +-
...ibxcrypt_4.4.30.bb => libxcrypt_4.4.33.bb} | 0
.../dmidecode/CVE-2023-30630_1a.patch | 236 ++++++++++++++
...-30630_1.patch => CVE-2023-30630_1b.patch} | 126 +++-----
.../dmidecode/CVE-2023-30630_2.patch | 11 +-
.../dmidecode/CVE-2023-30630_3.patch | 60 ++--
.../dmidecode/CVE-2023-30630_4.patch | 149 ++++-----
.../dmidecode/dmidecode_3.3.bb | 3 +-
.../python3-certifi/CVE-2023-37920.patch | 301 ++++++++++++++++++
.../python/python3-certifi_2021.10.8.bb | 4 +-
meta/recipes-devtools/qemu/qemu.inc | 3 +
.../qemu/qemu/CVE-2020-14394.patch | 79 +++++
.../qemu/qemu/CVE-2023-3180.patch | 50 +++
.../qemu/qemu/CVE-2023-3354.patch | 87 +++++
.../ghostscript/CVE-2023-38559.patch | 32 ++
.../ghostscript/ghostscript_9.55.0.bb | 1 +
.../procps/procps/CVE-2023-4016.patch | 85 +++++
meta/recipes-extended/procps/procps_3.3.17.bb | 1 +
.../linux-firmware/linux-firmware_20230515.bb | 2 +-
.../linux/linux-yocto-rt_5.10.bb | 6 +-
.../linux/linux-yocto-tiny_5.10.bb | 8 +-
meta/recipes-kernel/linux/linux-yocto_5.10.bb | 24 +-
.../curl/curl/CVE-2023-32001.patch | 39 +++
meta/recipes-support/curl/curl_7.82.0.bb | 1 +
scripts/rpm2cpio.sh | 30 +-
25 files changed, 1117 insertions(+), 223 deletions(-)
rename meta/recipes-core/libxcrypt/{libxcrypt_4.4.30.bb => libxcrypt_4.4.33.bb} (100%)
create mode 100644 meta/recipes-devtools/dmidecode/dmidecode/CVE-2023-30630_1a.patch
rename meta/recipes-devtools/dmidecode/dmidecode/{CVE-2023-30630_1.patch => CVE-2023-30630_1b.patch} (63%)
create mode 100644 meta/recipes-devtools/python/python3-certifi/CVE-2023-37920.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2020-14394.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2023-3180.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2023-3354.patch
create mode 100644 meta/recipes-extended/ghostscript/ghostscript/CVE-2023-38559.patch
create mode 100644 meta/recipes-extended/procps/procps/CVE-2023-4016.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2023-32001.patch
--
2.34.1
^ permalink raw reply [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 00/16] Patch review
@ 2023-11-22 2:30 Steve Sakoman
2023-11-22 2:30 ` [OE-core][kirkstone 01/16] tiff: Backport fix for CVE-2023-41175 Steve Sakoman
` (15 more replies)
0 siblings, 16 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:30 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Thursday, November 23
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6227
The following changes since commit 4bb6373e5f4a1330a063d1afe855d6c24d5461e7:
python3-jinja2: Fixed ptest result output as per the standard (2023-11-08 04:10:02 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Chaitanya Vadrevu (1):
go: Fix issue in DNS resolver
Deepthi Hemraj (2):
binutils: Fix CVE-2022-47007
binutils: Fix CVE-2022-48064
Lee Chee Yang (1):
ghostscript: ignore GhostPCL CVE-2023-38560
Meenali Gupta (5):
avahi: fix CVE-2023-38471
avahi: fix CVE-2023-38470
avahi: fix CVE-2023-38469
avahi: fix CVE-2023-38472
avahi: fix CVE-2023-38473
Niranjan Pradhan (1):
qemu 6.2.0: Fix CVE-2023-1544
Peter Marko (2):
go: ignore CVE-2023-45283 and CVE-2023-45284
goarch: Move Go architecture mapping to a library
Soumya Sambu (1):
sudo: upgrade 1.9.13p3 -> 1.9.15p2
Vijay Anusuri (1):
tiff: Backport fix for CVE-2023-41175
Wenlin Kang (1):
libxcrypt: fixed some build error for nativesdk with mingw
Yogita Urade (1):
grub: fix CVE-2023-4692
meta/classes/base.bbclass | 2 +-
meta/classes/goarch.bbclass | 27 +----
meta/lib/oe/go.py | 32 ++++++
.../grub/files/CVE-2023-4692.patch | 97 ++++++++++++++++
meta/recipes-bsp/grub/grub2.inc | 1 +
meta/recipes-connectivity/avahi/avahi_0.8.bb | 5 +
.../avahi/files/CVE-2023-38469.patch | 47 ++++++++
.../avahi/files/CVE-2023-38470.patch | 59 ++++++++++
.../avahi/files/CVE-2023-38471.patch | 73 ++++++++++++
.../avahi/files/CVE-2023-38472.patch | 46 ++++++++
.../avahi/files/CVE-2023-38473.patch | 108 ++++++++++++++++++
.../0001-Fix-for-compilation-on-Windows.patch | 37 ++++++
...dom-bytes.c-fixed-conversion-error-w.patch | 47 ++++++++
meta/recipes-core/libxcrypt/libxcrypt.inc | 4 +
.../binutils/binutils-2.38.inc | 2 +
.../binutils/0033-CVE-2022-47007.patch | 34 ++++++
.../binutils/0034-CVE-2022-48064.patch | 57 +++++++++
meta/recipes-devtools/go/go-1.17.13.inc | 5 +-
...Fix-issue-with-DNS-not-being-updated.patch | 51 +++++++++
meta/recipes-devtools/qemu/qemu.inc | 1 +
.../qemu/qemu/CVE-2023-1544.patch | 70 ++++++++++++
.../ghostscript/ghostscript_9.55.0.bb | 3 +
...me.c-correctly-include-header-for-ou.patch | 25 ----
meta/recipes-extended/sudo/sudo.inc | 5 +-
.../{sudo_1.9.13p3.bb => sudo_1.9.15p2.bb} | 3 +-
.../libtiff/tiff/CVE-2023-41175.patch | 69 +++++++++++
meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 1 +
27 files changed, 854 insertions(+), 57 deletions(-)
create mode 100644 meta/lib/oe/go.py
create mode 100644 meta/recipes-bsp/grub/files/CVE-2023-4692.patch
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38469.patch
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38470.patch
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38471.patch
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38472.patch
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38473.patch
create mode 100644 meta/recipes-core/libxcrypt/files/0001-Fix-for-compilation-on-Windows.patch
create mode 100644 meta/recipes-core/libxcrypt/files/0001-lib-util-get-random-bytes.c-fixed-conversion-error-w.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
create mode 100644 meta/recipes-devtools/binutils/binutils/0034-CVE-2022-48064.patch
create mode 100644 meta/recipes-devtools/go/go-1.20/0010-net-Fix-issue-with-DNS-not-being-updated.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2023-1544.patch
delete mode 100644 meta/recipes-extended/sudo/files/0001-lib-util-mksigname.c-correctly-include-header-for-ou.patch
rename meta/recipes-extended/sudo/{sudo_1.9.13p3.bb => sudo_1.9.15p2.bb} (92%)
create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2023-41175.patch
--
2.34.1
^ permalink raw reply [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 01/16] tiff: Backport fix for CVE-2023-41175
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
@ 2023-11-22 2:30 ` Steve Sakoman
2023-11-22 2:30 ` [OE-core][kirkstone 02/16] grub: fix CVE-2023-4692 Steve Sakoman
` (14 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:30 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/6e2dac5f904496d127c92ddc4e56eccfca25c2ee]
Reference: https://security-tracker.debian.org/tracker/CVE-2023-41175
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../libtiff/tiff/CVE-2023-41175.patch | 69 +++++++++++++++++++
meta/recipes-multimedia/libtiff/tiff_4.3.0.bb | 1 +
2 files changed, 70 insertions(+)
create mode 100644 meta/recipes-multimedia/libtiff/tiff/CVE-2023-41175.patch
diff --git a/meta/recipes-multimedia/libtiff/tiff/CVE-2023-41175.patch b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-41175.patch
new file mode 100644
index 0000000000..06645bed68
--- /dev/null
+++ b/meta/recipes-multimedia/libtiff/tiff/CVE-2023-41175.patch
@@ -0,0 +1,69 @@
+From 6e2dac5f904496d127c92ddc4e56eccfca25c2ee Mon Sep 17 00:00:00 2001
+From: Arie Haenel <arie.haenel@jct.ac.il>
+Date: Wed, 19 Jul 2023 19:40:01 +0000
+Subject: [PATCH] raw2tiff: fix integer overflow and bypass of the check (fixes #592)
+
+Upstream-Status: Backport [https://gitlab.com/libtiff/libtiff/-/commit/6e2dac5f904496d127c92ddc4e56eccfca25c2ee]
+CVE: CVE-2023-41175
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ tools/raw2tiff.c | 29 +++++++++++++++++++++++++++++
+ 1 file changed, 29 insertions(+)
+
+diff --git a/tools/raw2tiff.c b/tools/raw2tiff.c
+index dfee715..253c023 100644
+--- a/tools/raw2tiff.c
++++ b/tools/raw2tiff.c
+@@ -36,6 +36,7 @@
+ #include <sys/types.h>
+ #include <math.h>
+ #include <ctype.h>
++#include <limits.h>
+
+ #ifdef HAVE_UNISTD_H
+ # include <unistd.h>
+@@ -101,6 +102,7 @@ main(int argc, char* argv[])
+ int fd;
+ char *outfilename = NULL;
+ TIFF *out;
++ uint32_t temp_limit_check = 0; /* temp for integer overflow checking*/
+
+ uint32_t row, col, band;
+ int c;
+@@ -212,6 +214,33 @@ main(int argc, char* argv[])
+ if (guessSize(fd, dtype, hdr_size, nbands, swab, &width, &length) < 0)
+ return EXIT_FAILURE;
+
++ /* check for integer overflow in */
++ /* hdr_size + (*width) * (*length) * nbands * depth */
++
++ if ((width == 0) || (length == 0) ){
++ fprintf(stderr, "Too large nbands value specified.\n");
++ return (EXIT_FAILURE);
++ }
++
++ temp_limit_check = nbands * depth;
++
++ if ( !temp_limit_check || length > ( UINT_MAX / temp_limit_check ) ) {
++ fprintf(stderr, "Too large length size specified.\n");
++ return (EXIT_FAILURE);
++ }
++ temp_limit_check = temp_limit_check * length;
++
++ if ( !temp_limit_check || width > ( UINT_MAX / temp_limit_check ) ) {
++ fprintf(stderr, "Too large width size specified.\n");
++ return (EXIT_FAILURE);
++ }
++ temp_limit_check = temp_limit_check * width;
++
++ if ( !temp_limit_check || hdr_size > ( UINT_MAX - temp_limit_check ) ) {
++ fprintf(stderr, "Too large header size specified.\n");
++ return (EXIT_FAILURE);
++ }
++
+ if (outfilename == NULL)
+ outfilename = argv[optind+1];
+ out = TIFFOpen(outfilename, "w");
+--
+2.25.1
+
diff --git a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
index e925b7d652..11e3818c69 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.3.0.bb
@@ -46,6 +46,7 @@ SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz \
file://CVE-2022-40090.patch \
file://CVE-2023-1916.patch \
file://CVE-2023-40745.patch \
+ file://CVE-2023-41175.patch \
"
SRC_URI[sha256sum] = "0e46e5acb087ce7d1ac53cf4f56a09b221537fc86dfc5daaad1c2e89e1b37ac8"
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 02/16] grub: fix CVE-2023-4692
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
2023-11-22 2:30 ` [OE-core][kirkstone 01/16] tiff: Backport fix for CVE-2023-41175 Steve Sakoman
@ 2023-11-22 2:30 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 03/16] qemu 6.2.0: Fix CVE-2023-1544 Steve Sakoman
` (13 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:30 UTC (permalink / raw)
To: openembedded-core
From: Yogita Urade <yogita.urade@windriver.com>
An out-of-bounds write flaw was found in grub2's NTFS filesystem driver.
This issue may allow an attacker to present a specially crafted NTFS
filesystem image, leading to grub's heap metadata corruption. In some
circumstances, the attack may also corrupt the UEFI firmware heap metadata.
As a result, arbitrary code execution and secure boot protection bypass
may be achieved.
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-4692
https://bugzilla.redhat.com/show_bug.cgi?id=2236613
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../grub/files/CVE-2023-4692.patch | 97 +++++++++++++++++++
meta/recipes-bsp/grub/grub2.inc | 1 +
2 files changed, 98 insertions(+)
create mode 100644 meta/recipes-bsp/grub/files/CVE-2023-4692.patch
diff --git a/meta/recipes-bsp/grub/files/CVE-2023-4692.patch b/meta/recipes-bsp/grub/files/CVE-2023-4692.patch
new file mode 100644
index 0000000000..4780e35b7a
--- /dev/null
+++ b/meta/recipes-bsp/grub/files/CVE-2023-4692.patch
@@ -0,0 +1,97 @@
+From 43651027d24e62a7a463254165e1e46e42aecdea Mon Sep 17 00:00:00 2001
+From: Maxim Suhanov <dfirblog@gmail.com>
+Date: Thu, 16 Nov 2023 07:21:50 +0000
+Subject: [PATCH] fs/ntfs: Fix an OOB write when parsing the $ATTRIBUTE_LIST
+ attribute for the $MFT file
+
+When parsing an extremely fragmented $MFT file, i.e., the file described
+using the $ATTRIBUTE_LIST attribute, current NTFS code will reuse a buffer
+containing bytes read from the underlying drive to store sector numbers,
+which are consumed later to read data from these sectors into another buffer.
+
+These sectors numbers, two 32-bit integers, are always stored at predefined
+offsets, 0x10 and 0x14, relative to first byte of the selected entry within
+the $ATTRIBUTE_LIST attribute. Usually, this won't cause any problem.
+
+However, when parsing a specially-crafted file system image, this may cause
+the NTFS code to write these integers beyond the buffer boundary, likely
+causing the GRUB memory allocator to misbehave or fail. These integers contain
+values which are controlled by on-disk structures of the NTFS file system.
+
+Such modification and resulting misbehavior may touch a memory range not
+assigned to the GRUB and owned by firmware or another EFI application/driver.
+
+This fix introduces checks to ensure that these sector numbers are never
+written beyond the boundary.
+
+Fixes: CVE-2023-4692
+
+Reported-by: Maxim Suhanov <dfirblog@gmail.com>
+Signed-off-by: Maxim Suhanov <dfirblog@gmail.com>
+Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
+
+CVE: CVE-2023-4692
+Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=43651027d24e62a7a463254165e1e46e42aecdea]
+
+Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
+---
+ grub-core/fs/ntfs.c | 18 +++++++++++++++++-
+ 1 file changed, 17 insertions(+), 1 deletion(-)
+
+diff --git a/grub-core/fs/ntfs.c b/grub-core/fs/ntfs.c
+index 2f34f76..6009e49 100644
+--- a/grub-core/fs/ntfs.c
++++ b/grub-core/fs/ntfs.c
+@@ -184,7 +184,7 @@ find_attr (struct grub_ntfs_attr *at, grub_uint8_t attr)
+ }
+ if (at->attr_end)
+ {
+- grub_uint8_t *pa;
++ grub_uint8_t *pa, *pa_end;
+
+ at->emft_buf = grub_malloc (at->mft->data->mft_size << GRUB_NTFS_BLK_SHR);
+ if (at->emft_buf == NULL)
+@@ -209,11 +209,13 @@ find_attr (struct grub_ntfs_attr *at, grub_uint8_t attr)
+ }
+ at->attr_nxt = at->edat_buf;
+ at->attr_end = at->edat_buf + u32at (pa, 0x30);
++ pa_end = at->edat_buf + n;
+ }
+ else
+ {
+ at->attr_nxt = at->attr_end + u16at (pa, 0x14);
+ at->attr_end = at->attr_end + u32at (pa, 4);
++ pa_end = at->mft->buf + (at->mft->data->mft_size << GRUB_NTFS_BLK_SHR);
+ }
+ at->flags |= GRUB_NTFS_AF_ALST;
+ while (at->attr_nxt < at->attr_end)
+@@ -230,6 +232,13 @@ find_attr (struct grub_ntfs_attr *at, grub_uint8_t attr)
+ at->flags |= GRUB_NTFS_AF_GPOS;
+ at->attr_cur = at->attr_nxt;
+ pa = at->attr_cur;
++
++ if ((pa >= pa_end) || (pa_end - pa < 0x18))
++ {
++ grub_error (GRUB_ERR_BAD_FS, "can\'t parse attribute list");
++ return NULL;
++ }
++
+ grub_set_unaligned32 ((char *) pa + 0x10,
+ grub_cpu_to_le32 (at->mft->data->mft_start));
+ grub_set_unaligned32 ((char *) pa + 0x14,
+@@ -240,6 +249,13 @@ find_attr (struct grub_ntfs_attr *at, grub_uint8_t attr)
+ {
+ if (*pa != attr)
+ break;
++
++ if ((pa >= pa_end) || (pa_end - pa < 0x18))
++ {
++ grub_error (GRUB_ERR_BAD_FS, "can\'t parse attribute list");
++ return NULL;
++ }
++
+ if (read_attr
+ (at, pa + 0x10,
+ u32at (pa, 0x10) * (at->mft->data->mft_size << GRUB_NTFS_BLK_SHR),
+--
+2.40.0
diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc
index c14fe315d3..aaee8a1e03 100644
--- a/meta/recipes-bsp/grub/grub2.inc
+++ b/meta/recipes-bsp/grub/grub2.inc
@@ -38,6 +38,7 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \
file://loader-efi-chainloader-Simplify-the-loader-state.patch \
file://commands-boot-Add-API-to-pass-context-to-loader.patch \
file://CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch \
+ file://CVE-2023-4692.patch \
"
SRC_URI[sha256sum] = "23b64b4c741569f9426ed2e3d0e6780796fca081bee4c99f62aa3f53ae803f5f"
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 03/16] qemu 6.2.0: Fix CVE-2023-1544
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
2023-11-22 2:30 ` [OE-core][kirkstone 01/16] tiff: Backport fix for CVE-2023-41175 Steve Sakoman
2023-11-22 2:30 ` [OE-core][kirkstone 02/16] grub: fix CVE-2023-4692 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 04/16] avahi: fix CVE-2023-38471 Steve Sakoman
` (12 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Niranjan Pradhan <nirpradh@cisco.com>
Upstream Repository: https://gitlab.com/qemu-project/qemu.git
Bug Details: https://nvd.nist.gov/vuln/detail/CVE-2023-1544
Type: Security Fix
CVE: CVE-2023-1544
Score: 6.3
Patch: https://gitlab.com/qemu-project/qemu/-/commit/85fc35afa93c
Signed-off-by: Niranjan Pradhan <nirpradh@cisco.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-devtools/qemu/qemu.inc | 1 +
.../qemu/qemu/CVE-2023-1544.patch | 70 +++++++++++++++++++
2 files changed, 71 insertions(+)
create mode 100644 meta/recipes-devtools/qemu/qemu/CVE-2023-1544.patch
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc
index 83bd5d7e67..c8e4e2e6f3 100644
--- a/meta/recipes-devtools/qemu/qemu.inc
+++ b/meta/recipes-devtools/qemu/qemu.inc
@@ -101,6 +101,7 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \
file://CVE-2023-3354.patch \
file://CVE-2023-3180.patch \
file://CVE-2021-3638.patch \
+ file://CVE-2023-1544.patch \
"
UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar"
diff --git a/meta/recipes-devtools/qemu/qemu/CVE-2023-1544.patch b/meta/recipes-devtools/qemu/qemu/CVE-2023-1544.patch
new file mode 100644
index 0000000000..b4781e1c18
--- /dev/null
+++ b/meta/recipes-devtools/qemu/qemu/CVE-2023-1544.patch
@@ -0,0 +1,70 @@
+From e7d6e37675e422cfab2fe8c6bd411d2097228760 Mon Sep 17 00:00:00 2001
+From: Yuval Shaia <yuval.shaia.ml@gmail.com>
+Date: Wed, 1 Mar 2023 16:29:26 +0200
+Subject: [PATCH] hw/pvrdma: Protect against buggy or malicious guest driver
+
+Guest driver allocates and initialize page tables to be used as a ring
+of descriptors for CQ and async events.
+The page table that represents the ring, along with the number of pages
+in the page table is passed to the device.
+Currently our device supports only one page table for a ring.
+
+Let's make sure that the number of page table entries the driver
+reports, do not exceeds the one page table size.
+
+CVE: CVE-2023-1544
+Upstream-Status: Backport [https://gitlab.com/qemu-project/qemu/-/commit/85fc35afa93c]
+
+Reported-by: Soul Chen <soulchen8650@gmail.com>
+Signed-off-by: Yuval Shaia <yuval.shaia.ml@gmail.com>
+Fixes: CVE-2023-1544
+Message-ID: <20230301142926.18686-1-yuval.shaia.ml@gmail.com>
+Signed-off-by: Thomas Huth <thuth@redhat.com>
+(cherry picked from commit 85fc35afa93c7320d1641d344d0c5dfbe341d087)
+Signed-off-by: Niranjan Pradhan <nirpradh@cisco.com>
+---
+ hw/rdma/vmw/pvrdma_main.c | 16 +++++++++++++++-
+ 1 file changed, 15 insertions(+), 1 deletion(-)
+
+diff --git a/hw/rdma/vmw/pvrdma_main.c b/hw/rdma/vmw/pvrdma_main.c
+index 4fc6712025..55b338046e 100644
+--- a/hw/rdma/vmw/pvrdma_main.c
++++ b/hw/rdma/vmw/pvrdma_main.c
+@@ -91,19 +91,33 @@ static int init_dev_ring(PvrdmaRing *ring, PvrdmaRingState **ring_state,
+ dma_addr_t dir_addr, uint32_t num_pages)
+ {
+ uint64_t *dir, *tbl;
+- int rc = 0;
++ int max_pages, rc = 0;
+
+ if (!num_pages) {
+ rdma_error_report("Ring pages count must be strictly positive");
+ return -EINVAL;
+ }
+
++ /*
++ * Make sure we can satisfy the requested number of pages in a single
++ * TARGET_PAGE_SIZE sized page table (taking into account that first entry
++ * is reserved for ring-state)
++ */
++ max_pages = TARGET_PAGE_SIZE / sizeof(dma_addr_t) - 1;
++ if (num_pages > max_pages) {
++ rdma_error_report("Maximum pages on a single directory must not exceed %d\n",
++ max_pages);
++ return -EINVAL;
++ }
++
+ dir = rdma_pci_dma_map(pci_dev, dir_addr, TARGET_PAGE_SIZE);
+ if (!dir) {
+ rdma_error_report("Failed to map to page directory (ring %s)", name);
+ rc = -ENOMEM;
+ goto out;
+ }
++
++ /* We support only one page table for a ring */
+ tbl = rdma_pci_dma_map(pci_dev, dir[0], TARGET_PAGE_SIZE);
+ if (!tbl) {
+ rdma_error_report("Failed to map to page table (ring %s)", name);
+--
+2.35.6
+
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 04/16] avahi: fix CVE-2023-38471
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (2 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 03/16] qemu 6.2.0: Fix CVE-2023-1544 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 05/16] avahi: fix CVE-2023-38470 Steve Sakoman
` (11 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Meenali Gupta <meenali.gupta@windriver.com>
A vulnerability was found in Avahi. A reachable assertion exists
in the dbus_set_host_name function.
Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-connectivity/avahi/avahi_0.8.bb | 1 +
.../avahi/files/CVE-2023-38471.patch | 73 +++++++++++++++++++
2 files changed, 74 insertions(+)
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38471.patch
diff --git a/meta/recipes-connectivity/avahi/avahi_0.8.bb b/meta/recipes-connectivity/avahi/avahi_0.8.bb
index b5c966c102..ac04b42614 100644
--- a/meta/recipes-connectivity/avahi/avahi_0.8.bb
+++ b/meta/recipes-connectivity/avahi/avahi_0.8.bb
@@ -26,6 +26,7 @@ SRC_URI = "https://github.com/lathiat/avahi/releases/download/v${PV}/avahi-${PV}
file://0001-Fix-opening-etc-resolv.conf-error.patch \
file://handle-hup.patch \
file://local-ping.patch \
+ file://CVE-2023-38471.patch \
"
UPSTREAM_CHECK_URI = "https://github.com/lathiat/avahi/releases/"
diff --git a/meta/recipes-connectivity/avahi/files/CVE-2023-38471.patch b/meta/recipes-connectivity/avahi/files/CVE-2023-38471.patch
new file mode 100644
index 0000000000..40b61b71dd
--- /dev/null
+++ b/meta/recipes-connectivity/avahi/files/CVE-2023-38471.patch
@@ -0,0 +1,73 @@
+From 9cd4ea89b3ac89b7bb0196fda1aa88cd51b106b6 Mon Sep 17 00:00:00 2001
+From: Michal Sekletar <msekleta@redhat.com>
+Date: Mon, 23 Oct 2023 13:38:35 +0200
+Subject: [PATCH] core: extract host name using avahi_unescape_label()
+
+Previously we could create invalid escape sequence when we split the
+string on dot. For example, from valid host name "foo\\.bar" we have
+created invalid name "foo\\" and tried to set that as the host name
+which crashed the daemon.
+
+Fixes #453
+
+Upstream-Status: Backport [https://github.com/lathiat/avahi/commit/894f085f402e023a98cbb6f5a3d117bd88d93b09]
+CVE: CVE-2023-38471
+
+Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
+---
+ avahi-core/server.c | 27 +++++++++++++++++++++------
+ 1 file changed, 21 insertions(+), 6 deletions(-)
+
+diff --git a/avahi-core/server.c b/avahi-core/server.c
+index e507750..40f1d68 100644
+--- a/avahi-core/server.c
++++ b/avahi-core/server.c
+@@ -1295,7 +1295,11 @@ static void update_fqdn(AvahiServer *s) {
+ }
+
+ int avahi_server_set_host_name(AvahiServer *s, const char *host_name) {
+- char *hn = NULL;
++ char label_escaped[AVAHI_LABEL_MAX*4+1];
++ char label[AVAHI_LABEL_MAX];
++ char *hn = NULL, *h;
++ size_t len;
++
+ assert(s);
+
+ AVAHI_CHECK_VALIDITY(s, !host_name || avahi_is_valid_host_name(host_name), AVAHI_ERR_INVALID_HOST_NAME);
+@@ -1305,17 +1309,28 @@ int avahi_server_set_host_name(AvahiServer *s, const char *host_name) {
+ else
+ hn = avahi_normalize_name_strdup(host_name);
+
+- hn[strcspn(hn, ".")] = 0;
++ h = hn;
++ if (!avahi_unescape_label((const char **)&hn, label, sizeof(label))) {
++ avahi_free(h);
++ return AVAHI_ERR_INVALID_HOST_NAME;
++ }
++
++ avahi_free(h);
++
++ h = label_escaped;
++ len = sizeof(label_escaped);
++ if (!avahi_escape_label(label, strlen(label), &h, &len))
++ return AVAHI_ERR_INVALID_HOST_NAME;
+
+- if (avahi_domain_equal(s->host_name, hn) && s->state != AVAHI_SERVER_COLLISION) {
+- avahi_free(hn);
++ if (avahi_domain_equal(s->host_name, label_escaped) && s->state != AVAHI_SERVER_COLLISION)
+ return avahi_server_set_errno(s, AVAHI_ERR_NO_CHANGE);
+- }
+
+ withdraw_host_rrs(s);
+
+ avahi_free(s->host_name);
+- s->host_name = hn;
++ s->host_name = avahi_strdup(label_escaped);
++ if (!s->host_name)
++ return AVAHI_ERR_NO_MEMORY;
+
+ update_fqdn(s);
+
+--
+2.40.0
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 05/16] avahi: fix CVE-2023-38470
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (3 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 04/16] avahi: fix CVE-2023-38471 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 06/16] avahi: fix CVE-2023-38469 Steve Sakoman
` (10 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Meenali Gupta <meenali.gupta@windriver.com>
A vulnerability was found in Avahi. A reachable assertion exists
in the avahi_escape_label() function.
Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-connectivity/avahi/avahi_0.8.bb | 1 +
.../avahi/files/CVE-2023-38470.patch | 59 +++++++++++++++++++
2 files changed, 60 insertions(+)
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38470.patch
diff --git a/meta/recipes-connectivity/avahi/avahi_0.8.bb b/meta/recipes-connectivity/avahi/avahi_0.8.bb
index ac04b42614..a2ad9058d6 100644
--- a/meta/recipes-connectivity/avahi/avahi_0.8.bb
+++ b/meta/recipes-connectivity/avahi/avahi_0.8.bb
@@ -27,6 +27,7 @@ SRC_URI = "https://github.com/lathiat/avahi/releases/download/v${PV}/avahi-${PV}
file://handle-hup.patch \
file://local-ping.patch \
file://CVE-2023-38471.patch \
+ file://CVE-2023-38470.patch \
"
UPSTREAM_CHECK_URI = "https://github.com/lathiat/avahi/releases/"
diff --git a/meta/recipes-connectivity/avahi/files/CVE-2023-38470.patch b/meta/recipes-connectivity/avahi/files/CVE-2023-38470.patch
new file mode 100644
index 0000000000..5cf9af6fd6
--- /dev/null
+++ b/meta/recipes-connectivity/avahi/files/CVE-2023-38470.patch
@@ -0,0 +1,59 @@
+From 26806dbde54c5b40a2bf108d334ba59ec9d242d6 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Petr=20Men=C5=A1=C3=ADk?= <pemensik@redhat.com>
+Date: Tue, 11 Apr 2023 15:29:59 +0200
+Subject: [PATCH]Ensure each label is at least one byte long
+
+The only allowed exception is single dot, where it should return empty
+string.
+
+Fixes #454.
+
+Upstream-Status: Backport [https://github.com/lathiat/avahi/commit/94cb6489114636940ac683515417990b55b5d66c]
+CVE: CVE-2023-38470
+
+Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
+---
+ avahi-common/domain-test.c | 14 ++++++++++++++
+ avahi-common/domain.c | 2 +-
+ 2 files changed, 15 insertions(+), 1 deletion(-)
+
+diff --git a/avahi-common/domain-test.c b/avahi-common/domain-test.c
+index cf763ec..3acc1c1 100644
+--- a/avahi-common/domain-test.c
++++ b/avahi-common/domain-test.c
+@@ -45,6 +45,20 @@ int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char *argv[]) {
+ printf("%s\n", s = avahi_normalize_name_strdup("fo\\\\o\\..f oo."));
+ avahi_free(s);
+
++ printf("%s\n", s = avahi_normalize_name_strdup("."));
++ avahi_free(s);
++
++ s = avahi_normalize_name_strdup(",.=.}.=.?-.}.=.?.?.}.}.?.?.?.z.?.?.}.}."
++ "}.?.?.?.r.=.=.}.=.?.}}.}.?.?.?.zM.=.=.?.?.}.}.?.?.}.}.}"
++ ".?.?.?.r.=.=.}.=.?.}}.}.?.?.?.zM.=.=.?.?.}.}.?.?.?.zM.?`"
++ "?.}.}.}.?.?.?.r.=.?.}.=.?.?.}.?.?.?.}.=.?.?.}??.}.}.?.?."
++ "?.z.?.?.}.}.}.?.?.?.r.=.=.}.=.?.}}.}.?.?.?.zM.?`?.}.}.}."
++ "??.?.zM.?`?.}.}.}.?.?.?.r.=.?.}.=.?.?.}.?.?.?.}.=.?.?.}?"
++ "?.}.}.?.?.?.z.?.?.}.}.}.?.?.?.r.=.=.}.=.?.}}.}.?.?.?.zM."
++ "?`?.}.}.}.?.?.?.r.=.=.?.?`.?.?}.}.}.?.?.?.r.=.?.}.=.?.?."
++ "}.?.?.?.}.=.?.?.}");
++ assert(s == NULL);
++
+ printf("%i\n", avahi_domain_equal("\\065aa bbb\\.\\046cc.cc\\\\.dee.fff.", "Aaa BBB\\.\\.cc.cc\\\\.dee.fff"));
+ printf("%i\n", avahi_domain_equal("A", "a"));
+
+diff --git a/avahi-common/domain.c b/avahi-common/domain.c
+index 3b1ab68..e66d241 100644
+--- a/avahi-common/domain.c
++++ b/avahi-common/domain.c
+@@ -201,7 +201,7 @@ char *avahi_normalize_name(const char *s, char *ret_s, size_t size) {
+ }
+
+ if (!empty) {
+- if (size < 1)
++ if (size < 2)
+ return NULL;
+
+ *(r++) = '.';
+--
+2.40.0
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 06/16] avahi: fix CVE-2023-38469
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (4 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 05/16] avahi: fix CVE-2023-38470 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 07/16] avahi: fix CVE-2023-38472 Steve Sakoman
` (9 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Meenali Gupta <meenali.gupta@windriver.com>
A vulnerability was found in Avahi, where a reachable assertion
exists in avahi_dns_packet_append_record.
Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-connectivity/avahi/avahi_0.8.bb | 1 +
.../avahi/files/CVE-2023-38469.patch | 47 +++++++++++++++++++
2 files changed, 48 insertions(+)
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38469.patch
diff --git a/meta/recipes-connectivity/avahi/avahi_0.8.bb b/meta/recipes-connectivity/avahi/avahi_0.8.bb
index a2ad9058d6..c733f94e42 100644
--- a/meta/recipes-connectivity/avahi/avahi_0.8.bb
+++ b/meta/recipes-connectivity/avahi/avahi_0.8.bb
@@ -28,6 +28,7 @@ SRC_URI = "https://github.com/lathiat/avahi/releases/download/v${PV}/avahi-${PV}
file://local-ping.patch \
file://CVE-2023-38471.patch \
file://CVE-2023-38470.patch \
+ file://CVE-2023-38469.patch \
"
UPSTREAM_CHECK_URI = "https://github.com/lathiat/avahi/releases/"
diff --git a/meta/recipes-connectivity/avahi/files/CVE-2023-38469.patch b/meta/recipes-connectivity/avahi/files/CVE-2023-38469.patch
new file mode 100644
index 0000000000..f0f6c4bf7b
--- /dev/null
+++ b/meta/recipes-connectivity/avahi/files/CVE-2023-38469.patch
@@ -0,0 +1,47 @@
+From a337a1ba7d15853fb56deef1f464529af6e3a1cf Mon Sep 17 00:00:00 2001
+From: Evgeny Vereshchagin <evvers@ya.ru>
+Date: Mon, 23 Oct 2023 20:29:31 +0000
+Subject: [PATCH]core: reject overly long TXT resource records
+Closes https://github.com/lathiat/avahi/issues/455
+
+Upstream-Status: Backport [https://github.com/lathiat/avahi/pull/500/commits/a337a1ba7d15853fb56deef1f464529af6e3a1cf]
+CVE: CVE-2023-38469
+
+Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
+---
+ avahi-core/rr.c | 9 ++++++++-
+ 1 file changed, 8 insertions(+), 1 deletion(-)
+
+diff --git a/avahi-core/rr.c b/avahi-core/rr.c
+index 7fa0bee..b03a24c 100644
+--- a/avahi-core/rr.c
++++ b/avahi-core/rr.c
+@@ -32,6 +32,7 @@
+ #include <avahi-common/malloc.h>
+ #include <avahi-common/defs.h>
+
++#include "dns.h"
+ #include "rr.h"
+ #include "log.h"
+ #include "util.h"
+@@ -688,11 +689,17 @@ int avahi_record_is_valid(AvahiRecord *r) {
+ case AVAHI_DNS_TYPE_TXT: {
+
+ AvahiStringList *strlst;
++ size_t used = 0;
+
+- for (strlst = r->data.txt.string_list; strlst; strlst = strlst->next)
++ for (strlst = r->data.txt.string_list; strlst; strlst = strlst->next) {
+ if (strlst->size > 255 || strlst->size <= 0)
+ return 0;
+
++ used += 1+strlst->size;
++ if (used > AVAHI_DNS_RDATA_MAX)
++ return 0;
++ }
++
+ return 1;
+ }
+ }
+--
+2.40.0
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 07/16] avahi: fix CVE-2023-38472
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (5 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 06/16] avahi: fix CVE-2023-38469 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 08/16] avahi: fix CVE-2023-38473 Steve Sakoman
` (8 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Meenali Gupta <meenali.gupta@windriver.com>
A vulnerability was found in Avahi. A reachable assertion
exists in the avahi_rdata_parse() function.
Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-connectivity/avahi/avahi_0.8.bb | 1 +
.../avahi/files/CVE-2023-38472.patch | 46 +++++++++++++++++++
2 files changed, 47 insertions(+)
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38472.patch
diff --git a/meta/recipes-connectivity/avahi/avahi_0.8.bb b/meta/recipes-connectivity/avahi/avahi_0.8.bb
index c733f94e42..23801a7e54 100644
--- a/meta/recipes-connectivity/avahi/avahi_0.8.bb
+++ b/meta/recipes-connectivity/avahi/avahi_0.8.bb
@@ -29,6 +29,7 @@ SRC_URI = "https://github.com/lathiat/avahi/releases/download/v${PV}/avahi-${PV}
file://CVE-2023-38471.patch \
file://CVE-2023-38470.patch \
file://CVE-2023-38469.patch \
+ file://CVE-2023-38472.patch \
"
UPSTREAM_CHECK_URI = "https://github.com/lathiat/avahi/releases/"
diff --git a/meta/recipes-connectivity/avahi/files/CVE-2023-38472.patch b/meta/recipes-connectivity/avahi/files/CVE-2023-38472.patch
new file mode 100644
index 0000000000..2f172622c9
--- /dev/null
+++ b/meta/recipes-connectivity/avahi/files/CVE-2023-38472.patch
@@ -0,0 +1,46 @@
+From 4e2537500dd0a1333845482f1f4147ef906030dd Mon Sep 17 00:00:00 2001
+From: Michal Sekletar <msekleta@redhat.com>
+Date: Thu, 19 Oct 2023 17:36:44 +0200
+Subject: [PATCH]core: make sure there is rdata to process before
+ parsing it
+
+Fixes #452
+
+Upstream-Status: Backport [https://github.com/lathiat/avahi/commit/b024ae5749f4aeba03478e6391687c3c9c8dee40]
+CVE: CVE-2023-38472
+
+Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
+---
+ avahi-client/client-test.c | 3 +++
+ avahi-daemon/dbus-entry-group.c | 2 +-
+ 2 files changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/avahi-client/client-test.c b/avahi-client/client-test.c
+index 7d04a6a..57750a4 100644
+--- a/avahi-client/client-test.c
++++ b/avahi-client/client-test.c
+@@ -258,6 +258,9 @@ int main (AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char *argv[]) {
+ printf("%s\n", avahi_strerror(avahi_entry_group_add_service (group, AVAHI_IF_UNSPEC, AVAHI_PROTO_UNSPEC, 0, "Lathiat's Site", "_http._tcp", NULL, NULL, 80, "foo=bar", NULL)));
+ printf("add_record: %d\n", avahi_entry_group_add_record (group, AVAHI_IF_UNSPEC, AVAHI_PROTO_UNSPEC, 0, "TestX", 0x01, 0x10, 120, "\5booya", 6));
+
++ error = avahi_entry_group_add_record (group, AVAHI_IF_UNSPEC, AVAHI_PROTO_UNSPEC, 0, "TestX", 0x01, 0x10, 120, "", 0);
++ assert(error != AVAHI_OK);
++
+ avahi_entry_group_commit (group);
+
+ domain = avahi_domain_browser_new (avahi, AVAHI_IF_UNSPEC, AVAHI_PROTO_UNSPEC, NULL, AVAHI_DOMAIN_BROWSER_BROWSE, 0, avahi_domain_browser_callback, (char*) "omghai3u");
+diff --git a/avahi-daemon/dbus-entry-group.c b/avahi-daemon/dbus-entry-group.c
+index 4e879a5..aa23d4b 100644
+--- a/avahi-daemon/dbus-entry-group.c
++++ b/avahi-daemon/dbus-entry-group.c
+@@ -340,7 +340,7 @@ DBusHandlerResult avahi_dbus_msg_entry_group_impl(DBusConnection *c, DBusMessage
+ if (!(r = avahi_record_new_full (name, clazz, type, ttl)))
+ return avahi_dbus_respond_error(c, m, AVAHI_ERR_NO_MEMORY, NULL);
+
+- if (avahi_rdata_parse (r, rdata, size) < 0) {
++ if (!rdata || avahi_rdata_parse (r, rdata, size) < 0) {
+ avahi_record_unref (r);
+ return avahi_dbus_respond_error(c, m, AVAHI_ERR_INVALID_RDATA, NULL);
+ }
+--
+2.40.0
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 08/16] avahi: fix CVE-2023-38473
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (6 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 07/16] avahi: fix CVE-2023-38472 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 09/16] binutils: Fix CVE-2022-47007 Steve Sakoman
` (7 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Meenali Gupta <meenali.gupta@windriver.com>
A vulnerability was found in Avahi. A reachable assertion
exists in the avahi_alternative_host_name() function.
Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-connectivity/avahi/avahi_0.8.bb | 1 +
.../avahi/files/CVE-2023-38473.patch | 108 ++++++++++++++++++
2 files changed, 109 insertions(+)
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2023-38473.patch
diff --git a/meta/recipes-connectivity/avahi/avahi_0.8.bb b/meta/recipes-connectivity/avahi/avahi_0.8.bb
index 23801a7e54..af5284a252 100644
--- a/meta/recipes-connectivity/avahi/avahi_0.8.bb
+++ b/meta/recipes-connectivity/avahi/avahi_0.8.bb
@@ -30,6 +30,7 @@ SRC_URI = "https://github.com/lathiat/avahi/releases/download/v${PV}/avahi-${PV}
file://CVE-2023-38470.patch \
file://CVE-2023-38469.patch \
file://CVE-2023-38472.patch \
+ file://CVE-2023-38473.patch \
"
UPSTREAM_CHECK_URI = "https://github.com/lathiat/avahi/releases/"
diff --git a/meta/recipes-connectivity/avahi/files/CVE-2023-38473.patch b/meta/recipes-connectivity/avahi/files/CVE-2023-38473.patch
new file mode 100644
index 0000000000..8a372a072a
--- /dev/null
+++ b/meta/recipes-connectivity/avahi/files/CVE-2023-38473.patch
@@ -0,0 +1,108 @@
+From b448c9f771bada14ae8de175695a9729f8646797 Mon Sep 17 00:00:00 2001
+From: Michal Sekletar <msekleta@redhat.com>
+Date: Wed, 11 Oct 2023 17:45:44 +0200
+Subject: [PATCH]common: derive alternative host name from its
+ unescaped version
+
+Normalization of input makes sure we don't have to deal with special
+cases like unescaped dot at the end of label.
+
+Upstream-Status: Backport [https://github.com/lathiat/avahi/commit/b448c9f771bada14ae8de175695a9729f8646797]
+CVE: CVE-2023-38473
+
+Signed-off-by: Meenali Gupta <meenali.gupta@windriver.com>
+---
+ avahi-common/alternative-test.c | 3 +++
+ avahi-common/alternative.c | 27 +++++++++++++++++++--------
+ 2 files changed, 22 insertions(+), 8 deletions(-)
+
+diff --git a/avahi-common/alternative-test.c b/avahi-common/alternative-test.c
+index 9255435..681fc15 100644
+--- a/avahi-common/alternative-test.c
++++ b/avahi-common/alternative-test.c
+@@ -31,6 +31,9 @@ int main(AVAHI_GCC_UNUSED int argc, AVAHI_GCC_UNUSED char *argv[]) {
+ const char* const test_strings[] = {
+ "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX",
+ "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXüüüüüüü",
++ ").",
++ "\\.",
++ "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\\\\",
+ "gurke",
+ "-",
+ " #",
+diff --git a/avahi-common/alternative.c b/avahi-common/alternative.c
+index b3d39f0..a094e6d 100644
+--- a/avahi-common/alternative.c
++++ b/avahi-common/alternative.c
+@@ -49,15 +49,20 @@ static void drop_incomplete_utf8(char *c) {
+ }
+
+ char *avahi_alternative_host_name(const char *s) {
++ char label[AVAHI_LABEL_MAX], alternative[AVAHI_LABEL_MAX*4+1];
++ char *alt, *r, *ret;
+ const char *e;
+- char *r;
++ size_t len;
+
+ assert(s);
+
+ if (!avahi_is_valid_host_name(s))
+ return NULL;
+
+- if ((e = strrchr(s, '-'))) {
++ if (!avahi_unescape_label(&s, label, sizeof(label)))
++ return NULL;
++
++ if ((e = strrchr(label, '-'))) {
+ const char *p;
+
+ e++;
+@@ -74,19 +79,18 @@ char *avahi_alternative_host_name(const char *s) {
+
+ if (e) {
+ char *c, *m;
+- size_t l;
+ int n;
+
+ n = atoi(e)+1;
+ if (!(m = avahi_strdup_printf("%i", n)))
+ return NULL;
+
+- l = e-s-1;
++ len = e-label-1;
+
+- if (l >= AVAHI_LABEL_MAX-1-strlen(m)-1)
+- l = AVAHI_LABEL_MAX-1-strlen(m)-1;
++ if (len >= AVAHI_LABEL_MAX-1-strlen(m)-1)
++ len = AVAHI_LABEL_MAX-1-strlen(m)-1;
+
+- if (!(c = avahi_strndup(s, l))) {
++ if (!(c = avahi_strndup(label, len))) {
+ avahi_free(m);
+ return NULL;
+ }
+@@ -100,7 +104,7 @@ char *avahi_alternative_host_name(const char *s) {
+ } else {
+ char *c;
+
+- if (!(c = avahi_strndup(s, AVAHI_LABEL_MAX-1-2)))
++ if (!(c = avahi_strndup(label, AVAHI_LABEL_MAX-1-2)))
+ return NULL;
+
+ drop_incomplete_utf8(c);
+@@ -109,6 +113,13 @@ char *avahi_alternative_host_name(const char *s) {
+ avahi_free(c);
+ }
+
++ alt = alternative;
++ len = sizeof(alternative);
++ ret = avahi_escape_label(r, strlen(r), &alt, &len);
++
++ avahi_free(r);
++ r = avahi_strdup(ret);
++
+ assert(avahi_is_valid_host_name(r));
+
+ return r;
+--
+2.40.0
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 09/16] binutils: Fix CVE-2022-47007
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (7 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 08/16] avahi: fix CVE-2023-38473 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-23 12:41 ` Richard Purdie
2023-11-22 2:31 ` [OE-core][kirkstone 10/16] binutils: Fix CVE-2022-48064 Steve Sakoman
` (6 subsequent siblings)
15 siblings, 1 reply; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../binutils/binutils-2.38.inc | 1 +
.../binutils/0033-CVE-2022-47007.patch | 34 +++++++++++++++++++
2 files changed, 35 insertions(+)
create mode 100644 meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
diff --git a/meta/recipes-devtools/binutils/binutils-2.38.inc b/meta/recipes-devtools/binutils/binutils-2.38.inc
index 43cc97f1ef..dc29141812 100644
--- a/meta/recipes-devtools/binutils/binutils-2.38.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.38.inc
@@ -67,5 +67,6 @@ SRC_URI = "\
file://0031-CVE-2022-47695.patch \
file://CVE-2022-48063.patch \
file://0032-CVE-2022-47010.patch \
+ file://0033-CVE-2022-47007.patch \
"
S = "${WORKDIR}/git"
diff --git a/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch b/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
new file mode 100644
index 0000000000..cc6dfe684b
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
@@ -0,0 +1,34 @@
+From: Alan Modra <amodra@gmail.com>
+Date: Thu, 16 Jun 2022 23:30:41 +0000 (+0930)
+Subject: PR29254, memory leak in stab_demangle_v3_arg
+X-Git-Tag: binutils-2_39~237
+X-Git-Url: https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb
+
+PR29254, memory leak in stab_demangle_v3_arg
+
+ PR 29254
+ * stabs.c (stab_demangle_v3_arg): Free dt on failure path.
+
+Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb]
+
+CVE: CVE-2022-47007
+
+Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
+---
+
+diff --git a/binutils/stabs.c b/binutils/stabs.c
+index 2b5241637c1..796ff85b86a 100644
+--- a/binutils/stabs.c
++++ b/binutils/stabs.c
+@@ -5467,7 +5467,10 @@ stab_demangle_v3_arg (void *dhandle, struct stab_handle *info,
+ dc->u.s_binary.right,
+ &varargs);
+ if (pargs == NULL)
+- return NULL;
++ {
++ free (dt);
++ return NULL;
++ }
+
+ return debug_make_function_type (dhandle, dt, pargs, varargs);
+ }
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 10/16] binutils: Fix CVE-2022-48064
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (8 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 09/16] binutils: Fix CVE-2022-47007 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 11/16] ghostscript: ignore GhostPCL CVE-2023-38560 Steve Sakoman
` (5 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../binutils/binutils-2.38.inc | 1 +
.../binutils/0034-CVE-2022-48064.patch | 57 +++++++++++++++++++
2 files changed, 58 insertions(+)
create mode 100644 meta/recipes-devtools/binutils/binutils/0034-CVE-2022-48064.patch
diff --git a/meta/recipes-devtools/binutils/binutils-2.38.inc b/meta/recipes-devtools/binutils/binutils-2.38.inc
index dc29141812..3787063cba 100644
--- a/meta/recipes-devtools/binutils/binutils-2.38.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.38.inc
@@ -68,5 +68,6 @@ SRC_URI = "\
file://CVE-2022-48063.patch \
file://0032-CVE-2022-47010.patch \
file://0033-CVE-2022-47007.patch \
+ file://0034-CVE-2022-48064.patch \
"
S = "${WORKDIR}/git"
diff --git a/meta/recipes-devtools/binutils/binutils/0034-CVE-2022-48064.patch b/meta/recipes-devtools/binutils/binutils/0034-CVE-2022-48064.patch
new file mode 100644
index 0000000000..b0840366c7
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/0034-CVE-2022-48064.patch
@@ -0,0 +1,57 @@
+From: Alan Modra <amodra@gmail.com>
+Date: Tue, 20 Dec 2022 13:17:03 +0000 (+1030)
+Subject: PR29922, SHT_NOBITS section avoids section size sanity check
+X-Git-Tag: binutils-2_40~202
+X-Git-Url: https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=8f2c64de86bc3d7556121fe296dd679000283931
+
+PR29922, SHT_NOBITS section avoids section size sanity check
+
+ PR 29922
+ * dwarf2.c (find_debug_info): Ignore sections without
+ SEC_HAS_CONTENTS.
+
+Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=8f2c64de86bc3d7556121fe296dd679000283931]
+
+CVE: CVE-2022-48064
+
+Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
+
+---
+
+diff --git a/bfd/dwarf2.c b/bfd/dwarf2.c
+index 95f45708e9d..0cd8152ee6e 100644
+--- a/bfd/dwarf2.c
++++ b/bfd/dwarf2.c
+@@ -4831,16 +4831,19 @@ find_debug_info (bfd *abfd, const struct dwarf_debug_section *debug_sections,
+ {
+ look = debug_sections[debug_info].uncompressed_name;
+ msec = bfd_get_section_by_name (abfd, look);
+- if (msec != NULL)
++ /* Testing SEC_HAS_CONTENTS is an anti-fuzzer measure. Of
++ course debug sections always have contents. */
++ if (msec != NULL && (msec->flags & SEC_HAS_CONTENTS) != 0)
+ return msec;
+
+ look = debug_sections[debug_info].compressed_name;
+ msec = bfd_get_section_by_name (abfd, look);
+- if (msec != NULL)
++ if (msec != NULL && (msec->flags & SEC_HAS_CONTENTS) != 0)
+ return msec;
+
+ for (msec = abfd->sections; msec != NULL; msec = msec->next)
+- if (startswith (msec->name, GNU_LINKONCE_INFO))
++ if ((msec->flags & SEC_HAS_CONTENTS) != 0
++ && startswith (msec->name, GNU_LINKONCE_INFO))
+ return msec;
+
+ return NULL;
+@@ -4848,6 +4851,9 @@ find_debug_info (bfd *abfd, const struct dwarf_debug_section *debug_sections,
+
+ for (msec = after_sec->next; msec != NULL; msec = msec->next)
+ {
++ if ((msec->flags & SEC_HAS_CONTENTS) == 0)
++ continue;
++
+ look = debug_sections[debug_info].uncompressed_name;
+ if (strcmp (msec->name, look) == 0)
+ return msec;
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 11/16] ghostscript: ignore GhostPCL CVE-2023-38560
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (9 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 10/16] binutils: Fix CVE-2022-48064 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 12/16] go: ignore CVE-2023-45283 and CVE-2023-45284 Steve Sakoman
` (4 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Lee Chee Yang <chee.yang.lee@intel.com>
issue in GhostPCL.
GhostPCL not part of this GhostScript recipe.
Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb | 3 +++
1 file changed, 3 insertions(+)
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
index 4c4c22cf39..7f4050755c 100644
--- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
+++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb
@@ -23,6 +23,9 @@ UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar"
# however we use an external jpeg which doesn't have the issue.
CVE_CHECK_IGNORE += "CVE-2013-6629"
+# Issue in the GhostPCL. GhostPCL not part of this GhostScript recipe.
+CVE_CHECK_IGNORE += "CVE-2023-38560"
+
def gs_verdir(v):
return "".join(v.split("."))
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 12/16] go: ignore CVE-2023-45283 and CVE-2023-45284
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (10 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 11/16] ghostscript: ignore GhostPCL CVE-2023-38560 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 13/16] sudo: upgrade 1.9.13p3 -> 1.9.15p2 Steve Sakoman
` (3 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
These CVEs affect path handling on Windows.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-devtools/go/go-1.17.13.inc | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc
index 461819d80f..a0974629fb 100644
--- a/meta/recipes-devtools/go/go-1.17.13.inc
+++ b/meta/recipes-devtools/go/go-1.17.13.inc
@@ -54,5 +54,5 @@ SRC_URI[main.sha256sum] = "a1a48b23afb206f95e7bbaa9b898d965f90826f6f1d1fc0c1d784
# https://github.com/golang/go/issues/30999#issuecomment-910470358
CVE_CHECK_IGNORE += "CVE-2021-29923"
-# This is specific to Microsoft Windows
-CVE_CHECK_IGNORE += "CVE-2022-41716"
+# This are specific to Microsoft Windows
+CVE_CHECK_IGNORE += "CVE-2022-41716 CVE-2023-45283 CVE-2023-45284"
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 13/16] sudo: upgrade 1.9.13p3 -> 1.9.15p2
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (11 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 12/16] go: ignore CVE-2023-45283 and CVE-2023-45284 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 14/16] go: Fix issue in DNS resolver Steve Sakoman
` (2 subsequent siblings)
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Soumya Sambu <soumya.sambu@windriver.com>
License-update: file removed upstream
Drop patch as issue fixed upstream.
Changelog:
===========
1.9.15p2
* Fixed a bug on BSD systems where sudo would not restore the
terminal settings on exit if the terminal had parity enabled.
GitHub issue #326.
1.9.15p1
* Fixed a bug introduced in sudo 1.9.15 that prevented LDAP-based
sudoers from being able to read the ldap.conf file.
GitHub issue #325.
1.9.15
* Fixed an undefined symbol problem on older versions of macOS
when "intercept" or "log_subcmds" are enabled in sudoers.
GitHub issue #276.
* Fixed "make check" failure related to getpwent(3) wrapping
on NetBSD.
* Fixed the warning message for "sudo -l command" when the command
is not permitted. There was a missing space between "list" and
the actual command due to changes in sudo 1.9.14.
* Fixed a bug where output could go to the wrong terminal if
"use_pty" is enabled (the default) and the standard input, output
or error is redirected to a different terminal. Bug #1056.
* The visudo utility will no longer create an empty file when the
specified sudoers file does not exist and the user exits the
editor without making any changes. GitHub issue #294.
* The AIX and Solaris sudo packages on www.sudo.ws now support
"log_subcmds" and "intercept" with both 32-bit and 64-bit
binaries. Previously, they only worked when running binaries
with the same word size as the sudo binary. GitHub issue #289.
* The sudoers source is now logged in the JSON event log. This
makes it possible to tell which rule resulted in a match.
* Running "sudo -ll command" now produces verbose output that
includes matching rule as well as the path to the sudoers file
the matching rule came from. For LDAP sudoers, the name of the
matching sudoRole is printed instead.
* The embedded copy of zlib has been updated to version 1.3.
* The sudoers plugin has been modified to make it more resilient
to ROWHAMMER attacks on authentication and policy matching.
This addresses CVE-2023-42465.
* The sudoers plugin now constructs the user time stamp file path
name using the user-ID instead of the user name. This avoids a
potential problem with user names that contain a path separator
('/') being interpreted as part of the path name. A similar
issue in sudo-rs has been assigned CVE-2023-42456.
* A path separator ('/') in a user, group or host name is now
replaced with an underbar character ('_') when expanding escapes
in @include and @includedir directives as well as the "iolog_file"
and "iolog_dir" sudoers Default settings.
* The "intercept_verify" sudoers option is now only applied when
the "intercept" option is set in sudoers. Previously, it was
also applied when "log_subcmds" was enabled. Sudo 1.9.14
contained an incorrect fix for this. Bug #1058.
* Changes to terminal settings are now performed atomically, where
possible. If the command is being run in a pseudo-terminal and
the user's terminal is already in raw mode, sudo will not change
the user's terminal settings. This prevents concurrent sudo
processes from restoring the terminal settings to the wrong values.
GitHub issue #312.
* Reverted a change from sudo 1.9.4 that resulted in PAM session
modules being called with the environment of the command to be
run instead of the environment of the invoking user.
GitHub issue #318.
* New Indonesian translation from translationproject.org.
* The sudo_logsrvd server will now raise its open file descriptor
limit to the maximum allowed value when it starts up. Each
connection can require up to nine open file descriptors so the
default soft limit may be too low.
* Better log message when rejecting a command if the "intercept"
option is enabled and the "intercept_allow_setid" option is
disabled. Previously, "command not allowed" would be logged and
the user had no way of knowing what the actual problem was.
* Sudo will now log the invoking user's environment as "submitenv"
in the JSON logs. The command's environment ("runenv") is no
longer logged for commands rejected by the sudoers file or an
approval plugin.
1.9.14p3
* Fixed a crash with Python 3.12 when the sudo Python plugin is
unloaded. This only affects "make check" for the Python plugin.
* Adapted the sudo Python plugin test output to match Python 3.12.
1.9.14p2
* Fixed a crash on Linux systems introduced in version 1.9.14 when
running a command with a NULL argv[0] if "log_subcmds" or
"intercept" is enabled in sudoers.
* Fixed a problem with "stair-stepped" output when piping or
redirecting the output of a sudo command that takes user input.
* Fixed a bug introduced in sudo 1.9.14 that affects matching
sudoers rules containing a Runas_Spec with an empty Runas user.
These rules should only match when sudo's -g option is used but
were matching even without the -g option. GitHub issue #290.
1.9.14p1
* Fixed an invalid free bug in sudo_logsrvd that was introduced
in version 1.9.14 which could cause sudo_logsrvd to crash.
* The sudoers plugin no longer tries to send the terminal name
to the log server when no terminal is present. This bug was
introduced in version 1.9.14.
1.9.14
* Fixed a bug where if the "intercept" or "log_subcmds" sudoers
option was enabled and a sub-command was run where the first
entry of the argument vector didn't match the command being run.
This resulted in commands like "sudo su -" being killed due to
the mismatch. Bug #1050.
* The sudoers plugin now canonicalizes command path names before
matching (where possible). This fixes a bug where sudo could
execute the wrong path if there are multiple symbolic links with
the same target and the same base name in sudoers that a user is
allowed to run. GitHub issue #228.
* Improved command matching when a chroot is specified in sudoers.
The sudoers plugin will now change the root directory id needed
before performing command matching. Previously, the root directory
was simply prepended to the path that was being processed.
* When NETGROUP_BASE is set in the ldap.conf file, sudo will now
perform its own netgroup lookups of the host name instead of
using the system innetgr(3) function. This guarantees that user
and host netgroup lookups are performed using the same LDAP
server (or servers).
* Fixed a bug introduced in sudo 1.9.13 that resulted in a missing
" ; " separator between environment variables and the command
in log entries.
* The visudo utility now displays a warning when it ignores a file
in an include dir such as /etc/sudoers.d.
* When running a command in a pseudo-terminal, sudo will initialize
the terminal settings even if it is the background process.
Previously, sudo only initialized the pseudo-terminal when running
in the foreground. This fixes an issue where a program that
checks the window size would read the wrong value when sudo was
running in the background.
* Fixed a bug where only the first two digits of the TSID field
being was logged. Bug #1046.
* The "use_pty" sudoers option is now enabled by default. To
restore the historic behavior where a command is run in the
user's terminal, add "Defaults !use_pty" to the sudoers file.
GitHub issue #258.
* Sudo's "-b" option now works when the command is run in a
pseudo-terminal.
* When disabling core dumps, sudo now only modifies the soft limit
and leaves the hard limit as-is. This avoids problems on Linux
when sudo does not have CAP_SYS_RESOURCE, which may be the case
when run inside a container. GitHub issue #42.
* Sudo configuration file paths have been converted to colon-separated
lists of paths. This makes it possible to have configuration
files on a read-only file system while still allowing for local
modifications in a different (writable) directory. The new
--enable-adminconf configure option can be used to specify a
directory that is searched for configuration files in preference
to the sysconfdir (which is usually /etc).
* The NETGROUP_QUERY ldap.conf parameter can now be disabled for
LDAP servers that do not support querying the nisNetgroup object
by its nisNetgroupTriple attribute, while still allowing sudo to
query the LDAP server directly to determine netgroup membership.
* Fixed a long-standing bug where a sudoers rule without an explicit
runas list allowed the user to run a command as root and any
group instead of just one of the groups that root is a member
of. For example, a rule such as "myuser ALL = ALL" would permit
"sudo -u root -g othergroup" even if root did not belong to
"othergroup".
* Fixed a bug where a sudoers rule with an explicit runas list
allowed a user to run sudo commands as themselves. For example,
a rule such as "myuser ALL = (root) ALL", "myuser" should only
allow commands to be run as root (optionally using one of root's
groups). However, the rule also allowed the user to run
"sudo -u myuser -g myuser command".
* Fixed a bug that prevented the user from specifying a group on
the command line via "sudo -g" if the rule's Runas_Spec contained
a Runas_Alias.
* Sudo now requires a C compiler that conforms to ISO C99 or higher
to build.
Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
| 25 -------------------
meta/recipes-extended/sudo/sudo.inc | 5 ++--
.../{sudo_1.9.13p3.bb => sudo_1.9.15p2.bb} | 3 +--
3 files changed, 3 insertions(+), 30 deletions(-)
delete mode 100644 meta/recipes-extended/sudo/files/0001-lib-util-mksigname.c-correctly-include-header-for-ou.patch
rename meta/recipes-extended/sudo/{sudo_1.9.13p3.bb => sudo_1.9.15p2.bb} (92%)
diff --git a/meta/recipes-extended/sudo/files/0001-lib-util-mksigname.c-correctly-include-header-for-ou.patch b/meta/recipes-extended/sudo/files/0001-lib-util-mksigname.c-correctly-include-header-for-ou.patch
deleted file mode 100644
index f63ed553be..0000000000
--- a/meta/recipes-extended/sudo/files/0001-lib-util-mksigname.c-correctly-include-header-for-ou.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From f993c5c88faacc43971899aae2168ffb3e34dc80 Mon Sep 17 00:00:00 2001
-From: Alexander Kanavin <alex@linutronix.de>
-Date: Fri, 24 Sep 2021 13:36:24 +0200
-Subject: [PATCH] lib/util/mksigname.c: correctly include header for out of
- tree builds
-
-Upstream-Status: Submitted [https://github.com/sudo-project/sudo/pull/123]
-Signed-off-by: Alexander Kanavin <alex@linutronix.de>
----
- lib/util/mksigname.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/lib/util/mksigname.c b/lib/util/mksigname.c
-index de8b1ad..0a69e7e 100644
---- a/lib/util/mksigname.c
-+++ b/lib/util/mksigname.c
-@@ -36,7 +36,7 @@ main(int argc, char *argv[])
- {
- unsigned int i;
-
--#include "mksigname.h"
-+#include "lib/util/mksigname.h"
-
- printf("const char *const sudo_sys_signame[] = {\n");
- for (i = 0; i < nitems(sudo_sys_signame); i++) {
diff --git a/meta/recipes-extended/sudo/sudo.inc b/meta/recipes-extended/sudo/sudo.inc
index f22b3eab99..d3b6bf1ad8 100644
--- a/meta/recipes-extended/sudo/sudo.inc
+++ b/meta/recipes-extended/sudo/sudo.inc
@@ -8,7 +8,6 @@ LIC_FILES_CHKSUM = "file://LICENSE.md;md5=5100e20d35f9015f9eef6bdb27ba194f \
file://plugins/sudoers/redblack.c;beginline=1;endline=46;md5=03e35317699ba00b496251e0dfe9f109 \
file://lib/util/reallocarray.c;beginline=3;endline=15;md5=397dd45c7683e90b9f8bf24638cf03bf \
file://lib/util/fnmatch.c;beginline=3;endline=27;md5=004d7d2866ba1f5b41174906849d2e0f \
- file://lib/util/getcwd.c;beginline=2;endline=27;md5=50f8d9667750e18dea4e84a935c12009 \
file://lib/util/glob.c;beginline=2;endline=31;md5=2852f68687544e3eb8a0a61665506f0e \
file://lib/util/snprintf.c;beginline=3;endline=33;md5=b70df6179969e38fcf68da91b53b8029 \
file://include/sudo_queue.h;beginline=2;endline=27;md5=ad578e9664d17a010b63e4bc0576ee8d \
@@ -29,12 +28,12 @@ EXTRA_OECONF = "--with-editor=${base_bindir}/vi --with-env-editor"
EXTRA_OECONF:append:libc-musl = " --disable-hardening "
do_compile:prepend () {
- # Remove build host references from sudo_usage.h
+ # Remove build host references from config.h
sed -i \
-e 's,--with-libtool-sysroot=${STAGING_DIR_TARGET},,g' \
-e 's,--build=${BUILD_SYS},,g' \
-e 's,--host=${HOST_SYS},,g' \
- ${B}/src/sudo_usage.h
+ ${B}/config.h
}
# Explicitly create ${localstatedir}/lib before do_install to ensure
diff --git a/meta/recipes-extended/sudo/sudo_1.9.13p3.bb b/meta/recipes-extended/sudo/sudo_1.9.15p2.bb
similarity index 92%
rename from meta/recipes-extended/sudo/sudo_1.9.13p3.bb
rename to meta/recipes-extended/sudo/sudo_1.9.15p2.bb
index 2e11739470..431dfba3c2 100644
--- a/meta/recipes-extended/sudo/sudo_1.9.13p3.bb
+++ b/meta/recipes-extended/sudo/sudo_1.9.15p2.bb
@@ -3,12 +3,11 @@ require sudo.inc
SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \
${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
file://0001-sudo.conf.in-fix-conflict-with-multilib.patch \
- file://0001-lib-util-mksigname.c-correctly-include-header-for-ou.patch \
"
PAM_SRC_URI = "file://sudo.pam"
-SRC_URI[sha256sum] = "92334a12bb93e0c056b09f53e255ccb7d6f67c6350e2813cd9593ceeca78560b"
+SRC_URI[sha256sum] = "199c0cdbfa7efcfffa9c88684a8e2fb206a62b70a316507e4a91c89c873bbcc8"
DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}"
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 14/16] go: Fix issue in DNS resolver
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (12 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 13/16] sudo: upgrade 1.9.13p3 -> 1.9.15p2 Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 15/16] goarch: Move Go architecture mapping to a library Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 16/16] libxcrypt: fixed some build error for nativesdk with mingw Steve Sakoman
15 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Chaitanya Vadrevu <chaitanya.vadrevu@ni.com>
This change adds a patch that is a partial backport of an upstream
commit[1].
It fixes a bug in go's DNS resolver that was causing a docker issue
where the first "docker pull" always fails after system boot if docker
daemon is started before networking is completely up.
[1] https://github.com/golang/go/commit/d52883f443e1d564b0300acdd382af1769bf0477
Signed-off-by: Chaitanya Vadrevu <chaitanya.vadrevu@ni.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/recipes-devtools/go/go-1.17.13.inc | 1 +
...Fix-issue-with-DNS-not-being-updated.patch | 51 +++++++++++++++++++
2 files changed, 52 insertions(+)
create mode 100644 meta/recipes-devtools/go/go-1.20/0010-net-Fix-issue-with-DNS-not-being-updated.patch
diff --git a/meta/recipes-devtools/go/go-1.17.13.inc b/meta/recipes-devtools/go/go-1.17.13.inc
index a0974629fb..330f571d22 100644
--- a/meta/recipes-devtools/go/go-1.17.13.inc
+++ b/meta/recipes-devtools/go/go-1.17.13.inc
@@ -16,6 +16,7 @@ SRC_URI += "\
file://0009-Revert-cmd-go-make-sure-CC-and-CXX-are-absolute.patch \
file://0001-exec.go-do-not-write-linker-flags-into-buildids.patch \
file://0001-src-cmd-dist-buildgo.go-do-not-hardcode-host-compile.patch \
+ file://0010-net-Fix-issue-with-DNS-not-being-updated.patch \
file://CVE-2022-27664.patch \
file://0001-net-http-httputil-avoid-query-parameter-smuggling.patch \
file://CVE-2022-41715.patch \
diff --git a/meta/recipes-devtools/go/go-1.20/0010-net-Fix-issue-with-DNS-not-being-updated.patch b/meta/recipes-devtools/go/go-1.20/0010-net-Fix-issue-with-DNS-not-being-updated.patch
new file mode 100644
index 0000000000..6ead518843
--- /dev/null
+++ b/meta/recipes-devtools/go/go-1.20/0010-net-Fix-issue-with-DNS-not-being-updated.patch
@@ -0,0 +1,51 @@
+From 20176b390e28daa86b4552965cb7bd9181983c4d Mon Sep 17 00:00:00 2001
+From: Chaitanya Vadrevu <chaitanya.vadrevu@ni.com>
+Date: Mon, 6 Nov 2023 20:11:19 -0600
+Subject: [PATCH] net: Fix issue with DNS not being updated
+
+When dns requests are made, go's native DNS resolver only reads
+/etc/resolv.conf if the previous request is older than 5 seconds.
+
+On first network call, an initialization code runs that is
+supposed to initialize DNS data and set lastChecked time. There is a bug
+in this code that causes /etc/resolv.conf to not be read during
+initialization and the DNS data from program startup ends up being used
+until the next 5 seconds. This means that if /etc/resolv.conf changed
+between program startup and the first network call, old DNS data is
+still used until the next 5 seconds.
+
+This causes "docker pull" to fail the first time if docker daemon is
+started before networking is up.
+
+Upstream commit d52883f443e1d564b0300acdd382af1769bf0477 made lot of
+improvements to DNS resolver to fix some issues which also fixes this
+issue.
+This patch picks the relevant changes from it to fix this particular
+issue.
+
+Upstream-Status: Backport [https://github.com/golang/go/commit/d52883f443e1d564b0300acdd382af1769bf0477]
+
+Signed-off-by: Chaitanya Vadrevu <chaitanya.vadrevu@ni.com>
+---
+ src/net/dnsclient_unix.go | 5 +----
+ 1 file changed, 1 insertion(+), 4 deletions(-)
+
+diff --git a/src/net/dnsclient_unix.go b/src/net/dnsclient_unix.go
+index 6dfd4af..520ffe6 100644
+--- a/src/net/dnsclient_unix.go
++++ b/src/net/dnsclient_unix.go
+@@ -337,10 +337,7 @@ var resolvConf resolverConfig
+ func (conf *resolverConfig) init() {
+ // Set dnsConfig and lastChecked so we don't parse
+ // resolv.conf twice the first time.
+- conf.dnsConfig = systemConf().resolv
+- if conf.dnsConfig == nil {
+- conf.dnsConfig = dnsReadConfig("/etc/resolv.conf")
+- }
++ conf.dnsConfig = dnsReadConfig("/etc/resolv.conf")
+ conf.lastChecked = time.Now()
+
+ // Prepare ch so that only one update of resolverConfig may
+--
+2.34.1
+
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 15/16] goarch: Move Go architecture mapping to a library
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (13 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 14/16] go: Fix issue in DNS resolver Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-23 12:40 ` Richard Purdie
2023-11-22 2:31 ` [OE-core][kirkstone 16/16] libxcrypt: fixed some build error for nativesdk with mingw Steve Sakoman
15 siblings, 1 reply; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Other spaces uses the Go architecture definitions as their own (for
example, container arches are defined to be Go arches). To make it
easier for other places to use this mapping, move the code that does the
translation of OpenEmbedded arches to Go arches to a library.
(From oe-core rev: 3e86f72fc2e1cc2e5ea4b4499722d736941167ce)
This commit together with meta-virtualization commit
115f6367f37095415f289fb6981cda9608ac72ff
broke meta-virtualization master used with
meta-lts-mixins kirkstone/go which is our primary
usecase for having kirkstone/go mixin layer
Manually crafted since cherry-pick had too many conflicts:
* different path to classes
* additional architecture loongarch64
* different way how to import library
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Cc: Joshua Watt <JPEWhacker@gmail.com>
Cc: Bruce Ashfield <bruce.ashfield@gmail.com>
Cc: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
meta/classes/base.bbclass | 2 +-
meta/classes/goarch.bbclass | 27 +++------------------------
meta/lib/oe/go.py | 32 ++++++++++++++++++++++++++++++++
3 files changed, 36 insertions(+), 25 deletions(-)
create mode 100644 meta/lib/oe/go.py
diff --git a/meta/classes/base.bbclass b/meta/classes/base.bbclass
index b15c5839b6..ee26ee5597 100644
--- a/meta/classes/base.bbclass
+++ b/meta/classes/base.bbclass
@@ -12,7 +12,7 @@ inherit logging
OE_EXTRA_IMPORTS ?= ""
-OE_IMPORTS += "os sys time oe.path oe.utils oe.types oe.package oe.packagegroup oe.sstatesig oe.lsb oe.cachedpath oe.license oe.qa oe.reproducible oe.rust ${OE_EXTRA_IMPORTS}"
+OE_IMPORTS += "os sys time oe.path oe.utils oe.types oe.package oe.packagegroup oe.sstatesig oe.lsb oe.cachedpath oe.license oe.qa oe.reproducible oe.rust oe.go ${OE_EXTRA_IMPORTS}"
OE_IMPORTS[type] = "list"
PACKAGECONFIG_CONFARGS ??= ""
diff --git a/meta/classes/goarch.bbclass b/meta/classes/goarch.bbclass
index 92fec16b82..394c0c5d84 100644
--- a/meta/classes/goarch.bbclass
+++ b/meta/classes/goarch.bbclass
@@ -61,31 +61,10 @@ SECURITY_NOPIE_CFLAGS ??= ""
CCACHE_DISABLE ?= "1"
def go_map_arch(a, d):
- import re
- if re.match('i.86', a):
- return '386'
- elif a == 'x86_64':
- return 'amd64'
- elif re.match('arm.*', a):
- return 'arm'
- elif re.match('aarch64.*', a):
- return 'arm64'
- elif re.match('mips64el.*', a):
- return 'mips64le'
- elif re.match('mips64.*', a):
- return 'mips64'
- elif a == 'mips':
- return 'mips'
- elif a == 'mipsel':
- return 'mipsle'
- elif re.match('p(pc|owerpc)(64le)', a):
- return 'ppc64le'
- elif re.match('p(pc|owerpc)(64)', a):
- return 'ppc64'
- elif a == 'riscv64':
- return 'riscv64'
- else:
+ arch = oe.go.map_arch(a)
+ if not arch:
raise bb.parse.SkipRecipe("Unsupported CPU architecture: %s" % a)
+ return arch
def go_map_arm(a, d):
if a.startswith("arm"):
diff --git a/meta/lib/oe/go.py b/meta/lib/oe/go.py
new file mode 100644
index 0000000000..9996057f12
--- /dev/null
+++ b/meta/lib/oe/go.py
@@ -0,0 +1,32 @@
+#
+# Copyright OpenEmbedded Contributors
+#
+# SPDX-License-Identifier: MIT
+#
+
+import re
+
+def map_arch(a):
+ if re.match('i.86', a):
+ return '386'
+ elif a == 'x86_64':
+ return 'amd64'
+ elif re.match('arm.*', a):
+ return 'arm'
+ elif re.match('aarch64.*', a):
+ return 'arm64'
+ elif re.match('mips64el.*', a):
+ return 'mips64le'
+ elif re.match('mips64.*', a):
+ return 'mips64'
+ elif a == 'mips':
+ return 'mips'
+ elif a == 'mipsel':
+ return 'mipsle'
+ elif re.match('p(pc|owerpc)(64le)', a):
+ return 'ppc64le'
+ elif re.match('p(pc|owerpc)(64)', a):
+ return 'ppc64'
+ elif a == 'riscv64':
+ return 'riscv64'
+ return ''
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 16/16] libxcrypt: fixed some build error for nativesdk with mingw
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
` (14 preceding siblings ...)
2023-11-22 2:31 ` [OE-core][kirkstone 15/16] goarch: Move Go architecture mapping to a library Steve Sakoman
@ 2023-11-22 2:31 ` Steve Sakoman
2023-11-23 12:39 ` Richard Purdie
15 siblings, 1 reply; 32+ messages in thread
From: Steve Sakoman @ 2023-11-22 2:31 UTC (permalink / raw)
To: openembedded-core
From: Wenlin Kang <wenlin.kang@windriver.com>
Steps to reproduce
1) add layer meta-mingw
2) add line in local.conf
SDKMACHINE = "x86_64-mingw32"
3) bitbake nativesdk-libxcrypt
Fixed:
1. .symver error
| {standard input}: Assembler messages:
| {standard input}:4: Error: unknown pseudo-op: `.symver'
2. pedantic error
| ../git/lib/crypt.c:316:24: error: ISO C does not allow extra ';' outside of a function [-Werror=pedantic]
| 316 | SYMVER_crypt_gensalt_rn;
| |
3. conversion error
| ../git/lib/util-get-random-bytes.c: In function '_crypt_get_random_bytes':
| ../git/lib/util-get-random-bytes.c:140:42: error: conversion from 'size_t' {aka 'long long unsigned int'} to 'unsigned int' may change value [-Werror=conversion]
| 140 | ssize_t nread = read (fd, buf, buflen);
Signed-off-by: Wenlin Kang <wenlin.kang@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
.../0001-Fix-for-compilation-on-Windows.patch | 37 +++++++++++++++
...dom-bytes.c-fixed-conversion-error-w.patch | 47 +++++++++++++++++++
meta/recipes-core/libxcrypt/libxcrypt.inc | 4 ++
3 files changed, 88 insertions(+)
create mode 100644 meta/recipes-core/libxcrypt/files/0001-Fix-for-compilation-on-Windows.patch
create mode 100644 meta/recipes-core/libxcrypt/files/0001-lib-util-get-random-bytes.c-fixed-conversion-error-w.patch
diff --git a/meta/recipes-core/libxcrypt/files/0001-Fix-for-compilation-on-Windows.patch b/meta/recipes-core/libxcrypt/files/0001-Fix-for-compilation-on-Windows.patch
new file mode 100644
index 0000000000..5760ee09cc
--- /dev/null
+++ b/meta/recipes-core/libxcrypt/files/0001-Fix-for-compilation-on-Windows.patch
@@ -0,0 +1,37 @@
+From a507b628a5a5d4e4f1cf0f0a9a72967470ee7624 Mon Sep 17 00:00:00 2001
+From: Brecht Sanders <brecht@sanders.org>
+Date: Fri, 3 Feb 2023 08:44:49 +0100
+Subject: [PATCH] Fix for compilation on Windows
+
+This fix allows the library to build on Windows (at least with MinGW-w64).
+
+`.symver` is only supported for ELF format but Windows uses COFF/PE.
+
+Workaround dummy define of `symver_set()`
+
+Upstream-Status: Backport [https://github.com/besser82/libxcrypt/commit/a507b628a5a5d4e4f1cf0f0a9a72967470ee7624]
+
+Signed-off-by: Wenlin Kang <wenlin.kang@windriver.com>
+---
+ lib/crypt-port.h | 5 +++++
+ 1 file changed, 5 insertions(+)
+
+diff --git a/lib/crypt-port.h b/lib/crypt-port.h
+index f06ca24..a707939 100644
+--- a/lib/crypt-port.h
++++ b/lib/crypt-port.h
+@@ -201,6 +201,11 @@ extern size_t strcpy_or_abort (void *dst, size_t d_size, const void *src);
+ __asm__(".globl _" extstr); \
+ __asm__(".set _" extstr ", _" #intname)
+
++#elif defined _WIN32
++
++/* .symver is only supported for ELF format, Windows uses COFF/PE */
++# define symver_set(extstr, intname, version, mode)
++
+ #elif defined __GNUC__ && __GNUC__ >= 3
+
+ # define _strong_alias(name, aliasname) \
+--
+2.34.1
+
diff --git a/meta/recipes-core/libxcrypt/files/0001-lib-util-get-random-bytes.c-fixed-conversion-error-w.patch b/meta/recipes-core/libxcrypt/files/0001-lib-util-get-random-bytes.c-fixed-conversion-error-w.patch
new file mode 100644
index 0000000000..3846f76674
--- /dev/null
+++ b/meta/recipes-core/libxcrypt/files/0001-lib-util-get-random-bytes.c-fixed-conversion-error-w.patch
@@ -0,0 +1,47 @@
+From ff99091eb8a6b9e6edc567f6d2552183fbaacec3 Mon Sep 17 00:00:00 2001
+From: Wenlin Kang <wenlin.kang@windriver.com>
+Date: Mon, 6 Nov 2023 14:43:28 +0800
+Subject: [PATCH] lib/util-get-random-bytes.c: fixed conversion error with
+ mingw
+
+With x86_64-w64-mingw32-gcc. get below error:
+| ../git/lib/util-get-random-bytes.c: In function '_crypt_get_random_bytes':
+| ../git/lib/util-get-random-bytes.c:140:42: error: conversion from 'size_t' {aka 'long long unsigned int'} to 'unsigned int' may change value [-Werror=conversion]
+| 140 | ssize_t nread = read (fd, buf, buflen);
+| | ^~~~~~
+
+In util-get-random-bytes.c, has get_random_bytes(void *buf, size_t buflen),
+but in mingw-w64-mingw-w64/mingw-w64-headers/crt/io.h, read() has "unsigned int"
+read(int _FileHandle,void *_DstBuf,unsigned int _MaxCharCount), and has:
+ #ifdef _WIN64
+ __MINGW_EXTENSION typedef unsigned __int64 size_t;
+ #else
+ typedef unsigned int size_t;
+ #endif /* _WIN64 */
+
+Upstream-Status: Pending
+
+Signed-off-by: Wenlin Kang <wenlin.kang@windriver.com>
+---
+ lib/util-get-random-bytes.c | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/lib/util-get-random-bytes.c b/lib/util-get-random-bytes.c
+index 79816db..68cd378 100644
+--- a/lib/util-get-random-bytes.c
++++ b/lib/util-get-random-bytes.c
+@@ -137,7 +137,11 @@ get_random_bytes(void *buf, size_t buflen)
+ dev_urandom_doesnt_work = true;
+ else
+ {
++#ifdef _WIN64
++ ssize_t nread = read (fd, buf, (unsigned int)buflen);
++#else
+ ssize_t nread = read (fd, buf, buflen);
++#endif
+ if (nread < 0 || (size_t)nread < buflen)
+ dev_urandom_doesnt_work = true;
+
+--
+2.25.1
+
diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc
index 342cbd0d06..2b3cd31c2a 100644
--- a/meta/recipes-core/libxcrypt/libxcrypt.inc
+++ b/meta/recipes-core/libxcrypt/libxcrypt.inc
@@ -16,6 +16,8 @@ SRCBRANCH ?= "master"
SRC_URI += "file://fix_cflags_handling.patch \
file://0001-Make-BuildCommon.pm-compatible-with-latest-perl.patch \
file://0002-Remove-smartmatch-usage-from-gen-crypt-h.patch \
+ file://0001-Fix-for-compilation-on-Windows.patch \
+ file://0001-lib-util-get-random-bytes.c-fixed-conversion-error-w.patch \
"
PROVIDES = "virtual/crypt"
@@ -29,4 +31,6 @@ CPPFLAGS:append:class-nativesdk = " -Wno-error"
API = "--disable-obsolete-api"
EXTRA_OECONF += "${API}"
+CFLAGS:append:class-nativesdk = " -Wno-pedantic"
+
BBCLASSEXTEND = "native nativesdk"
--
2.34.1
^ permalink raw reply related [flat|nested] 32+ messages in thread
* Re: [OE-core][kirkstone 16/16] libxcrypt: fixed some build error for nativesdk with mingw
2023-11-22 2:31 ` [OE-core][kirkstone 16/16] libxcrypt: fixed some build error for nativesdk with mingw Steve Sakoman
@ 2023-11-23 12:39 ` Richard Purdie
2023-11-23 14:37 ` Steve Sakoman
0 siblings, 1 reply; 32+ messages in thread
From: Richard Purdie @ 2023-11-23 12:39 UTC (permalink / raw)
To: Steve Sakoman, openembedded-core
On Tue, 2023-11-21 at 16:31 -1000, Steve Sakoman wrote:
> From: Wenlin Kang <wenlin.kang@windriver.com>
>
> Steps to reproduce
> 1) add layer meta-mingw
> 2) add line in local.conf
> SDKMACHINE = "x86_64-mingw32"
> 3) bitbake nativesdk-libxcrypt
>
> Fixed:
> 1. .symver error
> | {standard input}: Assembler messages:
> | {standard input}:4: Error: unknown pseudo-op: `.symver'
>
> 2. pedantic error
> | ../git/lib/crypt.c:316:24: error: ISO C does not allow extra ';' outside of a function [-Werror=pedantic]
> | 316 | SYMVER_crypt_gensalt_rn;
> | |
>
> 3. conversion error
> | ../git/lib/util-get-random-bytes.c: In function '_crypt_get_random_bytes':
> | ../git/lib/util-get-random-bytes.c:140:42: error: conversion from 'size_t' {aka 'long long unsigned int'} to 'unsigned int' may change value [-Werror=conversion]
> | 140 | ssize_t nread = read (fd, buf, buflen);
>
> Signed-off-by: Wenlin Kang <wenlin.kang@windriver.com>
> Signed-off-by: Steve Sakoman <steve@sakoman.com>
> ---
> .../0001-Fix-for-compilation-on-Windows.patch | 37 +++++++++++++++
> ...dom-bytes.c-fixed-conversion-error-w.patch | 47 +++++++++++++++++++
> meta/recipes-core/libxcrypt/libxcrypt.inc | 4 ++
> 3 files changed, 88 insertions(+)
> create mode 100644 meta/recipes-core/libxcrypt/files/0001-Fix-for-compilation-on-Windows.patch
> create mode 100644 meta/recipes-core/libxcrypt/files/0001-lib-util-get-random-bytes.c-fixed-conversion-error-w.patch
This isn't in master, not is it going to be.
Cheers,
Richard
^ permalink raw reply [flat|nested] 32+ messages in thread
* Re: [OE-core][kirkstone 15/16] goarch: Move Go architecture mapping to a library
2023-11-22 2:31 ` [OE-core][kirkstone 15/16] goarch: Move Go architecture mapping to a library Steve Sakoman
@ 2023-11-23 12:40 ` Richard Purdie
2023-11-23 13:45 ` Bruce Ashfield
0 siblings, 1 reply; 32+ messages in thread
From: Richard Purdie @ 2023-11-23 12:40 UTC (permalink / raw)
To: Steve Sakoman, openembedded-core
On Tue, 2023-11-21 at 16:31 -1000, Steve Sakoman wrote:
> From: Peter Marko <peter.marko@siemens.com>
>
> Other spaces uses the Go architecture definitions as their own (for
> example, container arches are defined to be Go arches). To make it
> easier for other places to use this mapping, move the code that does the
> translation of OpenEmbedded arches to Go arches to a library.
>
> (From oe-core rev: 3e86f72fc2e1cc2e5ea4b4499722d736941167ce)
>
> This commit together with meta-virtualization commit
> 115f6367f37095415f289fb6981cda9608ac72ff
> broke meta-virtualization master used with
> meta-lts-mixins kirkstone/go which is our primary
> usecase for having kirkstone/go mixin layer
>
> Manually crafted since cherry-pick had too many conflicts:
> * different path to classes
> * additional architecture loongarch64
> * different way how to import library
>
> Signed-off-by: Peter Marko <peter.marko@siemens.com>
> Cc: Joshua Watt <JPEWhacker@gmail.com>
> Cc: Bruce Ashfield <bruce.ashfield@gmail.com>
> Cc: Jose Quaresma <jose.quaresma@foundries.io>
> Signed-off-by: Steve Sakoman <steve@sakoman.com>
> ---
> meta/classes/base.bbclass | 2 +-
> meta/classes/goarch.bbclass | 27 +++------------------------
> meta/lib/oe/go.py | 32 ++++++++++++++++++++++++++++++++
> 3 files changed, 36 insertions(+), 25 deletions(-)
> create mode 100644 meta/lib/oe/go.py
This did cause problems for some layers such as meta-virtualization so
I'd want to check those layers are ok with this?
Cheers,
Richard
^ permalink raw reply [flat|nested] 32+ messages in thread
* Re: [OE-core][kirkstone 09/16] binutils: Fix CVE-2022-47007
2023-11-22 2:31 ` [OE-core][kirkstone 09/16] binutils: Fix CVE-2022-47007 Steve Sakoman
@ 2023-11-23 12:41 ` Richard Purdie
2023-11-23 14:49 ` Steve Sakoman
0 siblings, 1 reply; 32+ messages in thread
From: Richard Purdie @ 2023-11-23 12:41 UTC (permalink / raw)
To: Steve Sakoman, openembedded-core
On Tue, 2023-11-21 at 16:31 -1000, Steve Sakoman wrote:
> From: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
>
> Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
> Signed-off-by: Steve Sakoman <steve@sakoman.com>
> ---
> .../binutils/binutils-2.38.inc | 1 +
> .../binutils/0033-CVE-2022-47007.patch | 34 +++++++++++++++++++
> 2 files changed, 35 insertions(+)
> create mode 100644 meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
>
> diff --git a/meta/recipes-devtools/binutils/binutils-2.38.inc b/meta/recipes-devtools/binutils/binutils-2.38.inc
> index 43cc97f1ef..dc29141812 100644
> --- a/meta/recipes-devtools/binutils/binutils-2.38.inc
> +++ b/meta/recipes-devtools/binutils/binutils-2.38.inc
> @@ -67,5 +67,6 @@ SRC_URI = "\
> file://0031-CVE-2022-47695.patch \
> file://CVE-2022-48063.patch \
> file://0032-CVE-2022-47010.patch \
> + file://0033-CVE-2022-47007.patch \
> "
> S = "${WORKDIR}/git"
> diff --git a/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch b/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
> new file mode 100644
> index 0000000000..cc6dfe684b
> --- /dev/null
> +++ b/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
> @@ -0,0 +1,34 @@
> +From: Alan Modra <amodra@gmail.com>
> +Date: Thu, 16 Jun 2022 23:30:41 +0000 (+0930)
> +Subject: PR29254, memory leak in stab_demangle_v3_arg
> +X-Git-Tag: binutils-2_39~237
> +X-Git-Url: https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb
> +
> +PR29254, memory leak in stab_demangle_v3_arg
> +
> + PR 29254
> + * stabs.c (stab_demangle_v3_arg): Free dt on failure path.
> +
> +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb]
> +
> +CVE: CVE-2022-47007
> +
> +Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
> +---
> +
This has not merged to master yet. It probably will but...
Cheers,
Richard
^ permalink raw reply [flat|nested] 32+ messages in thread
* Re: [OE-core][kirkstone 15/16] goarch: Move Go architecture mapping to a library
2023-11-23 12:40 ` Richard Purdie
@ 2023-11-23 13:45 ` Bruce Ashfield
2023-11-23 14:53 ` Steve Sakoman
0 siblings, 1 reply; 32+ messages in thread
From: Bruce Ashfield @ 2023-11-23 13:45 UTC (permalink / raw)
To: Richard Purdie; +Cc: Steve Sakoman, openembedded-core
On Thu, Nov 23, 2023 at 7:40 AM Richard Purdie
<richard.purdie@linuxfoundation.org> wrote:
>
> On Tue, 2023-11-21 at 16:31 -1000, Steve Sakoman wrote:
> > From: Peter Marko <peter.marko@siemens.com>
> >
> > Other spaces uses the Go architecture definitions as their own (for
> > example, container arches are defined to be Go arches). To make it
> > easier for other places to use this mapping, move the code that does the
> > translation of OpenEmbedded arches to Go arches to a library.
> >
> > (From oe-core rev: 3e86f72fc2e1cc2e5ea4b4499722d736941167ce)
> >
> > This commit together with meta-virtualization commit
> > 115f6367f37095415f289fb6981cda9608ac72ff
> > broke meta-virtualization master used with
> > meta-lts-mixins kirkstone/go which is our primary
> > usecase for having kirkstone/go mixin layer
> >
> > Manually crafted since cherry-pick had too many conflicts:
> > * different path to classes
> > * additional architecture loongarch64
> > * different way how to import library
> >
> > Signed-off-by: Peter Marko <peter.marko@siemens.com>
> > Cc: Joshua Watt <JPEWhacker@gmail.com>
> > Cc: Bruce Ashfield <bruce.ashfield@gmail.com>
> > Cc: Jose Quaresma <jose.quaresma@foundries.io>
> > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > ---
> > meta/classes/base.bbclass | 2 +-
> > meta/classes/goarch.bbclass | 27 +++------------------------
> > meta/lib/oe/go.py | 32 ++++++++++++++++++++++++++++++++
> > 3 files changed, 36 insertions(+), 25 deletions(-)
> > create mode 100644 meta/lib/oe/go.py
>
> This did cause problems for some layers such as meta-virtualization so
> I'd want to check those layers are ok with this?
>
It should be fine, the issues were around it not being present and recipes
trying to use the mapping directly without the go.bbclass being inherited.
It won't be used in kirkstone, so is a no-op there (for meta-virt), but that
does mean some mixin and multi release compatible layers can more
easily to backports.
Bruce
> Cheers,
>
> Richard
>
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#191144): https://lists.openembedded.org/g/openembedded-core/message/191144
> Mute This Topic: https://lists.openembedded.org/mt/102742416/1050810
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [bruce.ashfield@gmail.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
--
- Thou shalt not follow the NULL pointer, for chaos and madness await
thee at its end
- "Use the force Harry" - Gandalf, Star Trek II
^ permalink raw reply [flat|nested] 32+ messages in thread
* Re: [OE-core][kirkstone 16/16] libxcrypt: fixed some build error for nativesdk with mingw
2023-11-23 12:39 ` Richard Purdie
@ 2023-11-23 14:37 ` Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-23 14:37 UTC (permalink / raw)
To: Richard Purdie; +Cc: openembedded-core
On Thu, Nov 23, 2023 at 2:39 AM Richard Purdie
<richard.purdie@linuxfoundation.org> wrote:
>
> On Tue, 2023-11-21 at 16:31 -1000, Steve Sakoman wrote:
> > From: Wenlin Kang <wenlin.kang@windriver.com>
> >
> > Steps to reproduce
> > 1) add layer meta-mingw
> > 2) add line in local.conf
> > SDKMACHINE = "x86_64-mingw32"
> > 3) bitbake nativesdk-libxcrypt
> >
> > Fixed:
> > 1. .symver error
> > | {standard input}: Assembler messages:
> > | {standard input}:4: Error: unknown pseudo-op: `.symver'
> >
> > 2. pedantic error
> > | ../git/lib/crypt.c:316:24: error: ISO C does not allow extra ';' outside of a function [-Werror=pedantic]
> > | 316 | SYMVER_crypt_gensalt_rn;
> > | |
> >
> > 3. conversion error
> > | ../git/lib/util-get-random-bytes.c: In function '_crypt_get_random_bytes':
> > | ../git/lib/util-get-random-bytes.c:140:42: error: conversion from 'size_t' {aka 'long long unsigned int'} to 'unsigned int' may change value [-Werror=conversion]
> > | 140 | ssize_t nread = read (fd, buf, buflen);
> >
> > Signed-off-by: Wenlin Kang <wenlin.kang@windriver.com>
> > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > ---
> > .../0001-Fix-for-compilation-on-Windows.patch | 37 +++++++++++++++
> > ...dom-bytes.c-fixed-conversion-error-w.patch | 47 +++++++++++++++++++
> > meta/recipes-core/libxcrypt/libxcrypt.inc | 4 ++
> > 3 files changed, 88 insertions(+)
> > create mode 100644 meta/recipes-core/libxcrypt/files/0001-Fix-for-compilation-on-Windows.patch
> > create mode 100644 meta/recipes-core/libxcrypt/files/0001-lib-util-get-random-bytes.c-fixed-conversion-error-w.patch
>
> This isn't in master, not is it going to be.
OK, I will drop this patch for kirkstone. Thanks for the review.
Steve
^ permalink raw reply [flat|nested] 32+ messages in thread
* Re: [OE-core][kirkstone 09/16] binutils: Fix CVE-2022-47007
2023-11-23 12:41 ` Richard Purdie
@ 2023-11-23 14:49 ` Steve Sakoman
2023-11-23 14:54 ` Richard Purdie
0 siblings, 1 reply; 32+ messages in thread
From: Steve Sakoman @ 2023-11-23 14:49 UTC (permalink / raw)
To: Richard Purdie; +Cc: openembedded-core
On Thu, Nov 23, 2023 at 2:41 AM Richard Purdie
<richard.purdie@linuxfoundation.org> wrote:
>
> On Tue, 2023-11-21 at 16:31 -1000, Steve Sakoman wrote:
> > From: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
> >
> > Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
> > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > ---
> > .../binutils/binutils-2.38.inc | 1 +
> > .../binutils/0033-CVE-2022-47007.patch | 34 +++++++++++++++++++
> > 2 files changed, 35 insertions(+)
> > create mode 100644 meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
> >
> > diff --git a/meta/recipes-devtools/binutils/binutils-2.38.inc b/meta/recipes-devtools/binutils/binutils-2.38.inc
> > index 43cc97f1ef..dc29141812 100644
> > --- a/meta/recipes-devtools/binutils/binutils-2.38.inc
> > +++ b/meta/recipes-devtools/binutils/binutils-2.38.inc
> > @@ -67,5 +67,6 @@ SRC_URI = "\
> > file://0031-CVE-2022-47695.patch \
> > file://CVE-2022-48063.patch \
> > file://0032-CVE-2022-47010.patch \
> > + file://0033-CVE-2022-47007.patch \
> > "
> > S = "${WORKDIR}/git"
> > diff --git a/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch b/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
> > new file mode 100644
> > index 0000000000..cc6dfe684b
> > --- /dev/null
> > +++ b/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
> > @@ -0,0 +1,34 @@
> > +From: Alan Modra <amodra@gmail.com>
> > +Date: Thu, 16 Jun 2022 23:30:41 +0000 (+0930)
> > +Subject: PR29254, memory leak in stab_demangle_v3_arg
> > +X-Git-Tag: binutils-2_39~237
> > +X-Git-Url: https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb
> > +
> > +PR29254, memory leak in stab_demangle_v3_arg
> > +
> > + PR 29254
> > + * stabs.c (stab_demangle_v3_arg): Free dt on failure path.
> > +
> > +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb]
> > +
> > +CVE: CVE-2022-47007
> > +
> > +Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
> > +---
> > +
>
> This has not merged to master yet. It probably will but...
This CVE shouldn't affect master, it is for binutils versions 2.34
thru 2.38, while master is 2.41
See: https://nvd.nist.gov/vuln/detail/CVE-2022-47007
Steve
^ permalink raw reply [flat|nested] 32+ messages in thread
* Re: [OE-core][kirkstone 15/16] goarch: Move Go architecture mapping to a library
2023-11-23 13:45 ` Bruce Ashfield
@ 2023-11-23 14:53 ` Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2023-11-23 14:53 UTC (permalink / raw)
To: Bruce Ashfield; +Cc: Richard Purdie, openembedded-core
On Thu, Nov 23, 2023 at 3:45 AM Bruce Ashfield <bruce.ashfield@gmail.com> wrote:
>
> On Thu, Nov 23, 2023 at 7:40 AM Richard Purdie
> <richard.purdie@linuxfoundation.org> wrote:
> >
> > On Tue, 2023-11-21 at 16:31 -1000, Steve Sakoman wrote:
> > > From: Peter Marko <peter.marko@siemens.com>
> > >
> > > Other spaces uses the Go architecture definitions as their own (for
> > > example, container arches are defined to be Go arches). To make it
> > > easier for other places to use this mapping, move the code that does the
> > > translation of OpenEmbedded arches to Go arches to a library.
> > >
> > > (From oe-core rev: 3e86f72fc2e1cc2e5ea4b4499722d736941167ce)
> > >
> > > This commit together with meta-virtualization commit
> > > 115f6367f37095415f289fb6981cda9608ac72ff
> > > broke meta-virtualization master used with
> > > meta-lts-mixins kirkstone/go which is our primary
> > > usecase for having kirkstone/go mixin layer
> > >
> > > Manually crafted since cherry-pick had too many conflicts:
> > > * different path to classes
> > > * additional architecture loongarch64
> > > * different way how to import library
> > >
> > > Signed-off-by: Peter Marko <peter.marko@siemens.com>
> > > Cc: Joshua Watt <JPEWhacker@gmail.com>
> > > Cc: Bruce Ashfield <bruce.ashfield@gmail.com>
> > > Cc: Jose Quaresma <jose.quaresma@foundries.io>
> > > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > > ---
> > > meta/classes/base.bbclass | 2 +-
> > > meta/classes/goarch.bbclass | 27 +++------------------------
> > > meta/lib/oe/go.py | 32 ++++++++++++++++++++++++++++++++
> > > 3 files changed, 36 insertions(+), 25 deletions(-)
> > > create mode 100644 meta/lib/oe/go.py
> >
> > This did cause problems for some layers such as meta-virtualization so
> > I'd want to check those layers are ok with this?
> >
>
> It should be fine, the issues were around it not being present and recipes
> trying to use the mapping directly without the go.bbclass being inherited.
>
> It won't be used in kirkstone, so is a no-op there (for meta-virt), but that
> does mean some mixin and multi release compatible layers can more
> easily to backports.
Thanks for reviewing Richard and Bruce!
Since Bruce confirms there are no issues with meta-virt I'll leave
this in the series.
Steve
^ permalink raw reply [flat|nested] 32+ messages in thread
* Re: [OE-core][kirkstone 09/16] binutils: Fix CVE-2022-47007
2023-11-23 14:49 ` Steve Sakoman
@ 2023-11-23 14:54 ` Richard Purdie
0 siblings, 0 replies; 32+ messages in thread
From: Richard Purdie @ 2023-11-23 14:54 UTC (permalink / raw)
To: Steve Sakoman; +Cc: openembedded-core
On Thu, 2023-11-23 at 04:49 -1000, Steve Sakoman wrote:
> On Thu, Nov 23, 2023 at 2:41 AM Richard Purdie
> <richard.purdie@linuxfoundation.org> wrote:
> >
> > On Tue, 2023-11-21 at 16:31 -1000, Steve Sakoman wrote:
> > > From: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
> > >
> > > Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
> > > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > > ---
> > > .../binutils/binutils-2.38.inc | 1 +
> > > .../binutils/0033-CVE-2022-47007.patch | 34 +++++++++++++++++++
> > > 2 files changed, 35 insertions(+)
> > > create mode 100644 meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
> > >
> > > diff --git a/meta/recipes-devtools/binutils/binutils-2.38.inc b/meta/recipes-devtools/binutils/binutils-2.38.inc
> > > index 43cc97f1ef..dc29141812 100644
> > > --- a/meta/recipes-devtools/binutils/binutils-2.38.inc
> > > +++ b/meta/recipes-devtools/binutils/binutils-2.38.inc
> > > @@ -67,5 +67,6 @@ SRC_URI = "\
> > > file://0031-CVE-2022-47695.patch \
> > > file://CVE-2022-48063.patch \
> > > file://0032-CVE-2022-47010.patch \
> > > + file://0033-CVE-2022-47007.patch \
> > > "
> > > S = "${WORKDIR}/git"
> > > diff --git a/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch b/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
> > > new file mode 100644
> > > index 0000000000..cc6dfe684b
> > > --- /dev/null
> > > +++ b/meta/recipes-devtools/binutils/binutils/0033-CVE-2022-47007.patch
> > > @@ -0,0 +1,34 @@
> > > +From: Alan Modra <amodra@gmail.com>
> > > +Date: Thu, 16 Jun 2022 23:30:41 +0000 (+0930)
> > > +Subject: PR29254, memory leak in stab_demangle_v3_arg
> > > +X-Git-Tag: binutils-2_39~237
> > > +X-Git-Url: https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb
> > > +
> > > +PR29254, memory leak in stab_demangle_v3_arg
> > > +
> > > + PR 29254
> > > + * stabs.c (stab_demangle_v3_arg): Free dt on failure path.
> > > +
> > > +Upstream-Status: Backport [https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff_plain;h=0ebc886149c22aceaf8ed74267821a59ca9d03eb]
> > > +
> > > +CVE: CVE-2022-47007
> > > +
> > > +Signed-off-by: Deepthi Hemraj <Deepthi.Hemraj@windriver.com>
> > > +---
> > > +
> >
> > This has not merged to master yet. It probably will but...
>
> This CVE shouldn't affect master, it is for binutils versions 2.34
> thru 2.38, while master is 2.41
>
> See: https://nvd.nist.gov/vuln/detail/CVE-2022-47007
This was merged to master but clearly shouldn't be as it was reverted
upstream as part of:
https://sourceware.org/git/?p=binutils-gdb.git;a=commitdiff;h=19cacf672930cee20feaf1f3468e3d5ac3099ffd
Cheers,
Richard
^ permalink raw reply [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 00/16] Patch review
@ 2024-02-27 21:56 Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2024-02-27 21:56 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Thursday, February 29
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/6616
The following changes since commit 5103ce67741782e43612f495bcc851c6509b734b:
runqemu: direct mesa to use its own drivers, rather than ones provided by host distro (2024-02-25 05:51:38 -1000)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Adrian Freihofer (8):
oeqa: replace deprecated assertEquals
oeqa/selftest/recipetool: fix for python 3.12
oeqa/selftest/recipetool: expect meson.bb
oeqa/selftest/oelib/buildhistory: git default branch
feature-microblaze-versions.inc: python 3.12 regex
meta/lib/oeqa: python 3.12 regex
meta/recipes: python 3.12 regex
scripts: python 3.12 regex
Bruce Ashfield (2):
kernel: fix localversion in v6.3+
kernel: make LOCALVERSION consistent between recipes
Chris Laplante (1):
recipetool/create_buildsys_python: use importlib instead of imp
Ming Liu (1):
kernel.bbclass: introduce KERNEL_LOCALVERSION
Ross Burton (3):
populate_sdk_ext: use ConfigParser instead of SafeConfigParser
runqemu: add qmp socket support
oeqa/selftest/recipetool: downgrade meson version to not use
pyproject.toml
Trevor Gamblin (1):
scripts/runqemu: fix regex escape sequences
meta/classes/kernel-arch.bbclass | 1 -
meta/classes/kernel.bbclass | 24 +++++++++++-
meta/classes/kernelsrc.bbclass | 1 +
meta/classes/linux-kernel-base.bbclass | 11 ++++++
meta/classes/module-base.bbclass | 1 +
meta/classes/populate_sdk_ext.bbclass | 2 +-
meta/conf/documentation.conf | 1 +
.../feature-microblaze-versions.inc | 2 +-
meta/lib/oeqa/oetest.py | 2 +-
meta/lib/oeqa/sdk/buildtools-cases/sanity.py | 2 +-
meta/lib/oeqa/selftest/cases/bblayers.py | 2 +-
meta/lib/oeqa/selftest/cases/devtool.py | 2 +-
meta/lib/oeqa/selftest/cases/fitimage.py | 6 +--
meta/lib/oeqa/selftest/cases/liboe.py | 2 +-
.../oeqa/selftest/cases/oelib/buildhistory.py | 18 +++++++--
meta/lib/oeqa/selftest/cases/recipetool.py | 19 ++++++----
.../make-mod-scripts/make-mod-scripts_1.0.bb | 3 ++
.../perf/perf/sort-pmuevents.py | 8 ++--
meta/recipes-rt/rt-tests/files/rt_bmark.py | 2 +-
scripts/combo-layer | 2 +-
scripts/contrib/bbvars.py | 6 +--
scripts/contrib/convert-overrides.py | 8 ++--
scripts/lib/checklayer/__init__.py | 4 +-
scripts/lib/recipetool/create.py | 12 +++---
scripts/lib/recipetool/create_buildsys.py | 38 +++++++++----------
.../lib/recipetool/create_buildsys_python.py | 5 +--
scripts/oe-check-sstate | 2 +-
scripts/oe-pkgdata-util | 2 +-
scripts/opkg-query-helper.py | 2 +-
scripts/runqemu | 19 ++++++++--
30 files changed, 134 insertions(+), 75 deletions(-)
--
2.34.1
^ permalink raw reply [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 00/16] Patch review
@ 2024-10-02 13:12 Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2024-10-02 13:12 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Friday, October 4
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/typhoon/#/builders/83/builds/7370
The following changes since commit ff720f337e40761c7d4d544c963cf518ad5403ad:
lib/oeqa: rename assertRaisesRegexp to assertRaisesRegex (2024-09-21 06:18:58 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Aleksandar Nikolic (3):
install-buildtools: remove md5 checksum validation
install-buildtools: fix "test installation" step
scripts/install-buildtools: Update to 4.0.21
Deepthi Hemraj (3):
gcc: upgrade to v11.5
glibc: stable 2.35 branch updates
bintuils: stable 2.38 branch update
Jinfeng Wang (1):
procps: patch CVE-2023-4016
Martin Jansa (1):
populate_sdk_base: inherit nopackages
Mingli Yu (1):
curl: free old conn better on reuse
Paul Eggleton (1):
install-buildtools: support buildtools-make-tarball and update to 4.1
Peter Marko (4):
gnupg: Document CVE-2022-3219 and mark wontfix
wpa-supplicant: Ignore CVE-2024-5290
wpa-supplicant: Patch CVE-2024-3596
wpa-supplicant: Patch security advisory 2024-2
Purushottam Choudhary (1):
kmscube: Add patch to fix -int-conversion build error
Vijay Anusuri (1):
curl: backport Debian patch for CVE-2024-8096
meta/classes/populate_sdk_base.bbclass | 2 +-
meta/conf/distro/include/maintainers.inc | 2 +-
...valid-Rejected-Groups-element-length.patch | 52 +
...valid-Rejected-Groups-element-length.patch | 50 +
...id-Rejected-Groups-element-in-the-pa.patch | 38 +
.../wpa-supplicant/CVE-2024-3596_00.patch | 82 +
.../wpa-supplicant/CVE-2024-3596_01.patch | 165 +
.../wpa-supplicant/CVE-2024-3596_02.patch | 62 +
.../wpa-supplicant/CVE-2024-3596_03.patch | 37 +
.../wpa-supplicant/CVE-2024-3596_04.patch | 52 +
.../wpa-supplicant/CVE-2024-3596_05.patch | 51 +
.../wpa-supplicant/CVE-2024-3596_06.patch | 46 +
.../wpa-supplicant/CVE-2024-3596_07.patch | 67 +
.../wpa-supplicant/CVE-2024-3596_08.patch | 47 +
.../wpa-supplicant/wpa-supplicant_2.10.bb | 15 +
meta/recipes-core/glibc/glibc-version.inc | 2 +-
.../binutils/binutils-2.38.inc | 2 +-
.../gcc/{gcc-11.4.inc => gcc-11.5.inc} | 8 +-
...ian_11.4.bb => gcc-cross-canadian_11.5.bb} | 0
.../{gcc-cross_11.4.bb => gcc-cross_11.5.bb} | 0
...-crosssdk_11.4.bb => gcc-crosssdk_11.5.bb} | 0
...cc-runtime_11.4.bb => gcc-runtime_11.5.bb} | 0
...itizers_11.4.bb => gcc-sanitizers_11.5.bb} | 0
...{gcc-source_11.4.bb => gcc-source_11.5.bb} | 0
...rch64-Update-Neoverse-N2-core-defini.patch | 38 -
.../gcc/gcc/CVE-2023-4039.patch | 2893 -----------------
.../gcc/{gcc_11.4.bb => gcc_11.5.bb} | 0
...initial_11.4.bb => libgcc-initial_11.5.bb} | 0
.../gcc/{libgcc_11.4.bb => libgcc_11.5.bb} | 0
...ibgfortran_11.4.bb => libgfortran_11.5.bb} | 0
.../procps/procps/CVE-2023-4016-2.patch | 60 +
meta/recipes-extended/procps/procps_3.3.17.bb | 3 +-
...001-common-fix-cast-type-in-init_egl.patch | 34 +
meta/recipes-graphics/kmscube/kmscube_git.bb | 6 +-
...01-url-free-old-conn-better-on-reuse.patch | 95 +
.../curl/curl/CVE-2024-8096.patch | 210 ++
meta/recipes-support/curl/curl_7.82.0.bb | 2 +
meta/recipes-support/gnupg/gnupg_2.3.7.bb | 2 +
scripts/install-buildtools | 63 +-
39 files changed, 1219 insertions(+), 2967 deletions(-)
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0001-SAE-Check-for-invalid-Rejected-Groups-element-length.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0002-SAE-Check-for-invalid-Rejected-Groups-element-length.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/0003-SAE-Reject-invalid-Rejected-Groups-element-in-the-pa.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_00.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_01.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_02.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_03.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_04.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_05.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_06.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_07.patch
create mode 100644 meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/CVE-2024-3596_08.patch
rename meta/recipes-devtools/gcc/{gcc-11.4.inc => gcc-11.5.inc} (95%)
rename meta/recipes-devtools/gcc/{gcc-cross-canadian_11.4.bb => gcc-cross-canadian_11.5.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-cross_11.4.bb => gcc-cross_11.5.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-crosssdk_11.4.bb => gcc-crosssdk_11.5.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-runtime_11.4.bb => gcc-runtime_11.5.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-sanitizers_11.4.bb => gcc-sanitizers_11.5.bb} (100%)
rename meta/recipes-devtools/gcc/{gcc-source_11.4.bb => gcc-source_11.5.bb} (100%)
delete mode 100644 meta/recipes-devtools/gcc/gcc/0001-aarch64-Update-Neoverse-N2-core-defini.patch
delete mode 100644 meta/recipes-devtools/gcc/gcc/CVE-2023-4039.patch
rename meta/recipes-devtools/gcc/{gcc_11.4.bb => gcc_11.5.bb} (100%)
rename meta/recipes-devtools/gcc/{libgcc-initial_11.4.bb => libgcc-initial_11.5.bb} (100%)
rename meta/recipes-devtools/gcc/{libgcc_11.4.bb => libgcc_11.5.bb} (100%)
rename meta/recipes-devtools/gcc/{libgfortran_11.4.bb => libgfortran_11.5.bb} (100%)
create mode 100644 meta/recipes-extended/procps/procps/CVE-2023-4016-2.patch
create mode 100644 meta/recipes-graphics/kmscube/kmscube/0001-common-fix-cast-type-in-init_egl.patch
create mode 100644 meta/recipes-support/curl/curl/0001-url-free-old-conn-better-on-reuse.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2024-8096.patch
--
2.34.1
^ permalink raw reply [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 00/16] Patch review
@ 2025-01-20 17:50 Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2025-01-20 17:50 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Wednesday, January 22
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/842
The following changes since commit 8c32d91b64ae296d7832ddeb42983f4f3c237946:
ofono: fix CVE-2024-7547 (2025-01-14 05:49:41 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Aleksandar Nikolic (1):
scripts/install-buildtools: Update to 4.0.23
Alexander Kanavin (1):
rsync: update 3.2.5 -> 3.2.7
Archana Polampalli (6):
rsync: fix CVE-2024-12084
rsync: fix CVE-2024-12085
rsync: fix CVE-2024-12086
rsync: fix CVE-2024-12087
rsync: fix CVE-2024-12088
rsync: fix CVE-2024-12747
Divya Chellam (1):
wget: fix CVE-2024-10524
Khem Raj (1):
rsync: Delete pedantic errors re-ordering patch
Peter Marko (2):
socat: patch CVE-2024-54661
ofono: patch CVE-2024-7540, CVE-2024-7541, CVE-2024-7542
Ross Burton (2):
classes/nativesdk: also override TUNE_PKGARCH
classes/qemu: use tune to select QEMU_EXTRAOPTIONS, not package
architecture
Zhang Peng (2):
avahi: fix CVE-2024-52616
vte: fix CVE-2024-37535
meta/classes/nativesdk.bbclass | 1 +
meta/classes/qemu.bbclass | 8 +-
meta/recipes-connectivity/avahi/avahi_0.8.bb | 1 +
.../avahi/files/CVE-2024-52616.patch | 104 +++++++++
...024-7540_CVE-2024-7541_CVE-2024-7542.patch | 52 +++++
meta/recipes-connectivity/ofono/ofono_1.34.bb | 1 +
.../socat/socat/CVE-2024-54661.patch | 113 ++++++++++
.../socat/socat_1.7.4.4.bb | 4 +-
meta/recipes-devtools/gcc/gcc-testsuite.inc | 6 +-
...-prototypes-to-function-declarations.patch | 28 ++-
...antic-errors-at-the-end-of-configure.patch | 68 ------
.../rsync/files/CVE-2024-12084-0001.patch | 156 ++++++++++++++
.../rsync/files/CVE-2024-12084-0002.patch | 43 ++++
.../rsync/files/CVE-2024-12085.patch | 32 +++
.../rsync/files/CVE-2024-12086-0001.patch | 42 ++++
.../rsync/files/CVE-2024-12086-0002.patch | 108 ++++++++++
.../rsync/files/CVE-2024-12086-0003.patch | 108 ++++++++++
.../rsync/files/CVE-2024-12086-0004.patch | 41 ++++
.../rsync/files/CVE-2024-12087-0001.patch | 49 +++++
.../rsync/files/CVE-2024-12087-0002.patch | 31 +++
.../rsync/files/CVE-2024-12087-0003.patch | 40 ++++
.../rsync/files/CVE-2024-12088.patch | 141 +++++++++++++
.../rsync/files/CVE-2024-12747.patch | 192 +++++++++++++++++
.../rsync/{rsync_3.2.5.bb => rsync_3.2.7.bb} | 15 +-
.../wget/wget/CVE-2024-10524.patch | 197 ++++++++++++++++++
meta/recipes-extended/wget/wget_1.21.4.bb | 1 +
.../vte/vte/CVE-2024-37535-0001.patch | 63 ++++++
.../vte/vte/CVE-2024-37535-0002.patch | 85 ++++++++
meta/recipes-support/vte/vte_0.66.2.bb | 9 +-
scripts/install-buildtools | 4 +-
30 files changed, 1645 insertions(+), 98 deletions(-)
create mode 100644 meta/recipes-connectivity/avahi/files/CVE-2024-52616.patch
create mode 100644 meta/recipes-connectivity/ofono/ofono/CVE-2024-7540_CVE-2024-7541_CVE-2024-7542.patch
create mode 100644 meta/recipes-connectivity/socat/socat/CVE-2024-54661.patch
delete mode 100644 meta/recipes-devtools/rsync/files/0001-Turn-on-pedantic-errors-at-the-end-of-configure.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12084-0001.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12084-0002.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12085.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12086-0001.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12086-0002.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12086-0003.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12086-0004.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12087-0001.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12087-0002.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12087-0003.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12088.patch
create mode 100644 meta/recipes-devtools/rsync/files/CVE-2024-12747.patch
rename meta/recipes-devtools/rsync/{rsync_3.2.5.bb => rsync_3.2.7.bb} (81%)
create mode 100644 meta/recipes-extended/wget/wget/CVE-2024-10524.patch
create mode 100644 meta/recipes-support/vte/vte/CVE-2024-37535-0001.patch
create mode 100644 meta/recipes-support/vte/vte/CVE-2024-37535-0002.patch
--
2.43.0
^ permalink raw reply [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 00/16] Patch review
@ 2025-03-05 15:58 Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2025-03-05 15:58 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Friday, March 7
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/1121
The following changes since commit 8ea258ad9c83be5d9548a796f7dda4ac820fc435:
elfutils: Fix multiple CVEs (2025-02-28 07:18:33 -0800)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Johannes Kauffmann (1):
mesa: Fix missing GLES3 headers in SDK sysroot
Peter Marko (1):
libxml2: mark patch as fixing CVE-2025-27113
Vijay Anusuri (14):
xwayland: Fix CVE-2024-21885
xwayland: Fix CVE-2024-21886
xwayland: Fix CVE-2024-31080
xwayland: Fix CVE-2024-31081
xwayland: Fix CVE-2024-31083
xwayland: Fix CVE-2024-9632
xwayland: Fix CVE-2025-26594
xwayland: Fix CVE-2025-26595
xwayland: Fix CVE-2025-26596
xwayland: Fix CVE-2025-26597
xwayland: Fix CVE-2025-26598
xwayland: Fix CVE-2025-26599
xwayland: Fix CVE-2025-26600
xwayland: Fix CVE-2025-26601
...-child-axis.patch => CVE-2025-27113.patch} | 1 +
meta/recipes-core/libxml/libxml2_2.9.14.bb | 2 +-
meta/recipes-graphics/mesa/mesa.inc | 5 +
.../xwayland/xwayland/CVE-2024-21885.patch | 113 +++++++++++++++
.../xwayland/xwayland/CVE-2024-21886-1.patch | 74 ++++++++++
.../xwayland/xwayland/CVE-2024-21886-2.patch | 57 ++++++++
.../xwayland/xwayland/CVE-2024-31080.patch | 49 +++++++
.../xwayland/xwayland/CVE-2024-31081.patch | 47 +++++++
.../xwayland/CVE-2024-31083-0001.patch | 118 ++++++++++++++++
.../xwayland/CVE-2024-31083-0002.patch | 77 ++++++++++
.../xwayland/xwayland/CVE-2024-9632.patch | 59 ++++++++
.../xwayland/xwayland/CVE-2025-26594-1.patch | 54 +++++++
.../xwayland/xwayland/CVE-2025-26594-2.patch | 51 +++++++
.../xwayland/xwayland/CVE-2025-26595.patch | 65 +++++++++
.../xwayland/xwayland/CVE-2025-26596.patch | 49 +++++++
.../xwayland/xwayland/CVE-2025-26597.patch | 46 ++++++
.../xwayland/xwayland/CVE-2025-26598.patch | 120 ++++++++++++++++
.../xwayland/xwayland/CVE-2025-26599-1.patch | 66 +++++++++
.../xwayland/xwayland/CVE-2025-26599-2.patch | 129 +++++++++++++++++
.../xwayland/xwayland/CVE-2025-26600.patch | 68 +++++++++
.../xwayland/xwayland/CVE-2025-26601-1.patch | 71 ++++++++++
.../xwayland/xwayland/CVE-2025-26601-2.patch | 85 +++++++++++
.../xwayland/xwayland/CVE-2025-26601-3.patch | 52 +++++++
.../xwayland/xwayland/CVE-2025-26601-4.patch | 132 ++++++++++++++++++
.../xwayland/xwayland_22.1.8.bb | 21 +++
25 files changed, 1610 insertions(+), 1 deletion(-)
rename meta/recipes-core/libxml/libxml2/{0001-pattern-Fix-compilation-of-explicit-child-axis.patch => CVE-2025-27113.patch} (98%)
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-21885.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-21886-1.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-21886-2.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-31080.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-31081.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-31083-0001.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-31083-0002.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2024-9632.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26594-1.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26594-2.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26595.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26596.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26597.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26598.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26599-1.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26599-2.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26600.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26601-1.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26601-2.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26601-3.patch
create mode 100644 meta/recipes-graphics/xwayland/xwayland/CVE-2025-26601-4.patch
--
2.43.0
^ permalink raw reply [flat|nested] 32+ messages in thread
* [OE-core][kirkstone 00/16] Patch review
@ 2025-07-15 20:36 Steve Sakoman
0 siblings, 0 replies; 32+ messages in thread
From: Steve Sakoman @ 2025-07-15 20:36 UTC (permalink / raw)
To: openembedded-core
Please review this set of changes for kirkstone and have comments back by
end of day Thursday, July 17
Passed a-full on autobuilder:
https://autobuilder.yoctoproject.org/valkyrie/#/builders/29/builds/2021
The following changes since commit a7cea8a5c91d26ba7c3f72448f0897f5c2f81fd1:
linux-yocto/5.15: update to v5.15.186 (2025-07-08 09:05:09 -0700)
are available in the Git repository at:
https://git.openembedded.org/openembedded-core-contrib stable/kirkstone-nut
https://git.openembedded.org/openembedded-core-contrib/log/?h=stable/kirkstone-nut
Archana Polampalli (4):
openssl: fix CVE-2024-41996
ofono: fix CVE-2023-4232
ofono: fix CVE-2023-4235
gdk-pixbuf: fix CVE-2025-7345
Chen Qi (2):
coreutils: fix CVE-2025-5278
sudo: upgrade from 1.9.15p2 to 1.9.15p5
Deepesh Varatharajan (1):
bintuils: stable 2.38 branch update
Guocai He (1):
tcf-agent: correct the SRC_URI
Hitendra Prajapati (1):
libxml2: fix CVE-2025-49794 & CVE-2025-49796
Peter Marko (4):
python3: update CVE product
openssl: upgrade 3.0.16 -> 3.0.17
ghostscript: ignore CVE-2025-46646
iputils: patch CVE-2025-48964
Praveen Kumar (1):
sudo: upgrade 1.9.15p5 -> 1.9.17p1
Ross Burton (1):
oeqa/core/decorator: add decorators to skip based on HOST_ARCH
Steve Sakoman (1):
Revert "coreutils: fix CVE-2025-5278"
meta/lib/oeqa/core/decorator/data.py | 24 +++
.../ofono/ofono/CVE-2023-4232.patch | 30 +++
.../ofono/ofono/CVE-2023-4235.patch | 37 ++++
meta/recipes-connectivity/ofono/ofono_1.34.bb | 2 +
.../openssl/openssl/CVE-2024-41996.patch | 48 +++++
.../{openssl_3.0.16.bb => openssl_3.0.17.bb} | 3 +-
.../coreutils/coreutils/CVE-2025-5278.patch | 10 +-
.../CVE-2025-49794-CVE-2025-49796.patch | 181 ++++++++++++++++++
meta/recipes-core/libxml/libxml2_2.9.14.bb | 1 +
.../binutils/binutils-2.38.inc | 2 +-
.../python/python3_3.10.18.bb | 2 +-
.../tcf-agent/tcf-agent_git.bb | 2 +-
.../ghostscript/ghostscript_9.55.0.bb | 2 +
.../iputils/iputils/CVE-2025-48964.patch | 99 ++++++++++
.../iputils/iputils_20211215.bb | 1 +
...o.conf.in-fix-conflict-with-multilib.patch | 7 +-
meta/recipes-extended/sudo/sudo.inc | 2 +-
.../{sudo_1.9.15p2.bb => sudo_1.9.17p1.bb} | 54 +++++-
.../gdk-pixbuf/gdk-pixbuf/CVE-2025-7345.patch | 55 ++++++
.../gdk-pixbuf/gdk-pixbuf_2.42.10.bb | 1 +
20 files changed, 548 insertions(+), 15 deletions(-)
create mode 100644 meta/recipes-connectivity/ofono/ofono/CVE-2023-4232.patch
create mode 100644 meta/recipes-connectivity/ofono/ofono/CVE-2023-4235.patch
create mode 100644 meta/recipes-connectivity/openssl/openssl/CVE-2024-41996.patch
rename meta/recipes-connectivity/openssl/{openssl_3.0.16.bb => openssl_3.0.17.bb} (98%)
create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2025-49794-CVE-2025-49796.patch
create mode 100644 meta/recipes-extended/iputils/iputils/CVE-2025-48964.patch
rename meta/recipes-extended/sudo/{sudo_1.9.15p2.bb => sudo_1.9.17p1.bb} (52%)
create mode 100644 meta/recipes-gnome/gdk-pixbuf/gdk-pixbuf/CVE-2025-7345.patch
--
2.43.0
^ permalink raw reply [flat|nested] 32+ messages in thread
end of thread, other threads:[~2025-07-15 20:36 UTC | newest]
Thread overview: 32+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-11-22 2:30 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
2023-11-22 2:30 ` [OE-core][kirkstone 01/16] tiff: Backport fix for CVE-2023-41175 Steve Sakoman
2023-11-22 2:30 ` [OE-core][kirkstone 02/16] grub: fix CVE-2023-4692 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 03/16] qemu 6.2.0: Fix CVE-2023-1544 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 04/16] avahi: fix CVE-2023-38471 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 05/16] avahi: fix CVE-2023-38470 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 06/16] avahi: fix CVE-2023-38469 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 07/16] avahi: fix CVE-2023-38472 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 08/16] avahi: fix CVE-2023-38473 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 09/16] binutils: Fix CVE-2022-47007 Steve Sakoman
2023-11-23 12:41 ` Richard Purdie
2023-11-23 14:49 ` Steve Sakoman
2023-11-23 14:54 ` Richard Purdie
2023-11-22 2:31 ` [OE-core][kirkstone 10/16] binutils: Fix CVE-2022-48064 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 11/16] ghostscript: ignore GhostPCL CVE-2023-38560 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 12/16] go: ignore CVE-2023-45283 and CVE-2023-45284 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 13/16] sudo: upgrade 1.9.13p3 -> 1.9.15p2 Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 14/16] go: Fix issue in DNS resolver Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 15/16] goarch: Move Go architecture mapping to a library Steve Sakoman
2023-11-23 12:40 ` Richard Purdie
2023-11-23 13:45 ` Bruce Ashfield
2023-11-23 14:53 ` Steve Sakoman
2023-11-22 2:31 ` [OE-core][kirkstone 16/16] libxcrypt: fixed some build error for nativesdk with mingw Steve Sakoman
2023-11-23 12:39 ` Richard Purdie
2023-11-23 14:37 ` Steve Sakoman
-- strict thread matches above, loose matches on Subject: below --
2025-07-15 20:36 [OE-core][kirkstone 00/16] Patch review Steve Sakoman
2025-03-05 15:58 Steve Sakoman
2025-01-20 17:50 Steve Sakoman
2024-10-02 13:12 Steve Sakoman
2024-02-27 21:56 Steve Sakoman
2023-08-17 2:49 Steve Sakoman
2022-09-13 14:17 Steve Sakoman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox